CN113313499A - Method and system for detecting jewelry certificate of authentication - Google Patents

Method and system for detecting jewelry certificate of authentication Download PDF

Info

Publication number
CN113313499A
CN113313499A CN202110284749.3A CN202110284749A CN113313499A CN 113313499 A CN113313499 A CN 113313499A CN 202110284749 A CN202110284749 A CN 202110284749A CN 113313499 A CN113313499 A CN 113313499A
Authority
CN
China
Prior art keywords
information
certificate
jewelry
characteristic information
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110284749.3A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Zhongshi Aimu Culture Co ltd
Original Assignee
Guangdong Zhongshi Aimu Culture Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Zhongshi Aimu Culture Co ltd filed Critical Guangdong Zhongshi Aimu Culture Co ltd
Priority to CN202110284749.3A priority Critical patent/CN113313499A/en
Publication of CN113313499A publication Critical patent/CN113313499A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/40Document-oriented image-based pattern recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Artificial Intelligence (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a system for detecting a jewelry certificate, which are used for conveniently detecting the authenticity of the jewelry certificate of each authentication mechanism and comprise the steps of setting mechanism characteristic information of each detection mechanism, and storing the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information; acquiring digital image information of a jewelry identification certificate; analyzing mechanism characteristic information based on the digital image information of the jewelry identification certificate, judging whether the analyzed mechanism characteristic information is in compliance according to a detection mechanism characteristic information table set in the setting step, and if not, outputting related information which is not credible about the jewelry identification certificate.

Description

Method and system for detecting jewelry certificate of authentication
Technical Field
The invention relates to the field of jewelry jades, in particular to a method and a system for detecting a jewelry certificate of appraisal.
Background
Jewelry includes jade articles, gold, silver, and ornaments made of natural materials (minerals, rocks, creatures, etc.), and the like. Generally, jewelry, artware or other collections of value are collectively referred to as jewelry.
Jewelry is generally expensive and it is not easy for ordinary consumers to judge its authenticity. Therefore, various quality control mechanisms have emerged to help consumers buy genuine products.
Some countries will assign some jewelry authentication organizations to perform jewelry authenticity authentication to avoid the serious loss of consumers due to buying counterfeit goods, and these authentication organizations are generally highly trusted due to government regulation. In China, there are many organizations for jewelry quality evaluation, and each organization is often provided with a plurality of branches, so that the jewelry quality evaluation organizations are all located in provinces of the whole country. For example, the detection mechanisms in Beijing are numerous: the quality control system comprises a national jewelry jade quality supervision and detection center, a national jewelry quality supervision and inspection center, a Zhongbao-xibao jade detection center, an international jewelry union Chinese laboratory Beijing Gaoded jewelry appraisal research institute, a Chinese national industrial and commercial union jewelry business jewelry detection and research center, a Chinese geological university Beijing Dida gem inspection center, a Beijing Xinghua gem identification center, a Beijing-xibao-bao detection center and the like, wherein the quality control organizations can be more than one branch organization only in Beijing, and are more numerous branch organizations in other cities in China. Quality inspection institutions governed by provinces and cities of each province and city, such as Shanghai BaoJade monitoring center, China east Ridgery university Gem detection center, Tongji university GeoJade detection center, Shanghai GeoJade test appraisal department, Tianjin BaoJade detection center, Tianjin City GeoJade detection center, Chongqing appraisal center, Chongqing City GeoJade quality supervision and inspection station, Hebei province GeoJade quality supervision and inspection station, Shijiazhuang City GeoJade quality supervision and inspection station, Tangshan GeoJade quality inspection station, Dalian GeoJade quality supervision and inspection station, Liaoning BaoJade quality supervision and inspection station, Jilin product quality supervision and inspection station, Jilin GeoJade quality inspection station, Jilin Jewel detection center, Heilongjiang GeoJade quality supervision and inspection station, quality inspection station, and inspection of Shanghai GeoJade, A quality supervision and inspection station for black dragon river jewelry jade, an inner Mongolia gold and silver jewelry quality detection center, a quality supervision and inspection station for Zhejiang gold jewelry decorations, Zhejiang jewelry jade quality and the like. It is impossible to enumerate one by one, and the authentication mechanisms of provinces and cities are criss-cross.
In addition, foreign jewelry authentication agencies are also numerous. Such as the british gem association and gem detection laboratory (FGA), the american college of Gems (GIA), the belgium diamond high-order layer conference (HRD), and the like.
At home and abroad, a plurality of detection organizations have no way for consumers to remember the styles and anti-counterfeiting marks of various certificates, and even if the consumers remember the styles and anti-counterfeiting marks, the consumers cannot distinguish the authenticity of the jewelry identification certificates by naked eyes at the first time. For this reason, various authentication organizations have introduced a system for judging the authenticity of certificates on-line, and users can judge the authenticity of certificates by scanning a two-dimensional code on a certificate or by inputting a certificate number and an authentication code on the system. However, these existing systems have a great disadvantage, which results in that after a great number of consumers perform jewelry certificate of authenticity detection through the mechanism of the system, the consumers are not only not prompted with risks, but also misled to the consumers to mistakenly understand "fake" jewelry certificates as "true" jewelry certificates. In addition, the certificate authentication system of each authentication authority can only authenticate the authenticity made by the authority, even to a certain extent, only the authentic certificate made by the authority can be authenticated as 'authentic', but the certificate which is faked by other persons as a fake certificate made by the authority cannot be authenticated, and the certificate of pearl treasure made by other authentic authorities cannot be authenticated. This causes great inconvenience to the consumer.
The manpower and material resources are still very limited in the scrutiny of the supervision department, so that a system capable of automatically identifying the false certificate is urgently needed.
There are currently very many lines on which jewelry is sold and a fake certificate is used as a shield. Fig. 1 shows the front side of a counterfeit jewelry certificate of authenticity, fig. 2 shows the back side of a counterfeit certificate, and fig. 3 shows a web page presented to a consumer by a certificate authority system according to the prior art that is susceptible to the consumer mistakenly believing that the certificate is a genuine authority jewelry certificate of authenticity.
Such examples are numerous and simple to find through the website search function that many consumers have a deceptive experience. The prior art makes it difficult for consumers to easily recognize that these jewelry certificates are fake ones. Some consumers teach to other jewelry experts more carefully to professional forums, but many consumers are deceived by the prior art online system of jewelry certificates of authenticity. Even if the consumer can ask the professional to identify the authenticity of the jewelry authentication certificate on the network or off-line, the method is inconvenient, delays the purchasing occasion, and even obtains the point of the professional after being found to be deceived.
FIG. 9 is a flow chart of a prior art detection method. In step S800, the user is prompted to input the number and the verification code on the certificate. Then, in step S801, the corresponding authentication certificate information corresponding to the number and the authentication code is inquired. If the inquiry is made, authentication certificate information corresponding to the number and the authentication code is presented to the user in step S802 to prompt the user that the authentication certificate is genuine, whereas information on the absence of the authentication certificate to be inquired is returned in step S803.
FIG. 10 is a flow chart of another prior art detection method. In step S900, the web address sent by the user through the wechat scanning function is received. Then, in step S901, the page to which the website address points is queried, and if the query is found, the queried page is sent back to the WeChat end of the user in S903, and on the contrary, the process proceeds to step S904, and information that the certificate to be queried does not exist is returned.
As can be seen from fig. 8 and 9, in the prior art, the user queries whether the corresponding certificate information exists or not "blindly", and returns the certificate information to prompt the user that the certificate is true, which exactly drills a void for an illegal organization. The bad merchant may even direct the user to the wrong server to verify the authentication credential information, thereby prompting the user that the credentials are correct. The common consumer is difficult to identify the correctness of the website, and particularly when the mobile terminal browser does not display the website information to the user at all, the poor merchant is well protected. For example, fig. 9 most commonly shows a case where a wechat scan function is used to check whether the certificate is authentic, but no website information is displayed at all in a page where wechat is used to display returned certificate identification information. In addition, with the popularization and application of the two-dimensional code, the status of the website of the character is gradually faded in the identification certificate, but the consumer cannot judge whether the two-dimensional code points to a legal server, so that even a professional jewelry appraiser can hardly distinguish the authenticity of the identification certificate by naked eyes.
Disclosure of Invention
The invention aims to solve the technical problem that the prior art can not allow consumers to conveniently detect the authenticity of the jewelry identification certificates of all the identification organizations.
In order to solve the above technical problem, an embodiment of the present application provides a method for detecting a jewelry certificate of authenticity. The method comprises the following steps: a setting step of setting mechanism characteristic information of each detection mechanism, and storing the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information; an input step of obtaining digital image information of a jewelry authentication certificate; a detection step of analyzing the organization characteristic information based on the digital image information of the jewelry identification certificate, and judging whether the analyzed organization characteristic information is in compliance according to the detection organization characteristic information table set in the setting step; and an output step of outputting the related information that the jewelry authentication certificate is not authentic if the judgment result of the detection step is negative. The mechanism characteristic information refers to information for characterizing the detection mechanism.
Preferably, the setting step further comprises: mechanism characteristic information including reference detection mechanism website information and/or reference detection mechanism name information of each detection mechanism is set, and the set mechanism characteristic information is stored in a detection mechanism characteristic information table and serves as reference mechanism characteristic information. The detecting step further comprises: analyzing mechanism characteristic information including a detection mechanism website and/or a detection mechanism name based on digital image information of the jewelry identification certificate, and judging whether domain names and/or detection mechanism names of the analyzed detection mechanism websites are contained in standard detection mechanism website information of a detection mechanism characteristic information table; if the judgment result is yes, the analyzed detection mechanism website is judged to be in compliance, otherwise, the judgment result is judged to be not in compliance.
Preferably, the setting step further comprises: setting mechanism characteristic information of each detection mechanism, wherein the mechanism characteristic information comprises reference detection mechanism website information and reference detection mechanism name information, and storing the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information; analyzing organization characteristic information comprising a detection organization website and a detection organization name based on digital image information of the jewelry identification certificate; searching reference detection mechanism website information corresponding to the analyzed detection mechanism name from the detection mechanism characteristic information table, judging whether the domain name of the reference detection mechanism website information is consistent with the domain name of the analyzed detection mechanism website, and if the domain name of the reference detection mechanism website information is inconsistent with the domain name of the analyzed detection mechanism website, judging whether the judgment result of the detection step is negative.
Preferably, if the determination result of the detecting step is yes, the detecting step further includes: analyzing the characteristic information of the identified object based on the digital image information of the Zhubao identification certificate; acquiring reference characteristic information of the identified object corresponding to the analyzed characteristic information of the identified object from the server pointed by the analyzed website of the detection mechanism; further, it is judged whether or not the analyzed feature information of the object to be authenticated matches the reference feature information of the corresponding object to be authenticated, and if it is judged that "no", information on the object whose jewelry authentication certificate is not authentic is output. Wherein the characteristic information of the object to be authenticated and the reference characteristic information of the authentication object include at least one or more of the following parameters: weight, shape, name, color, refractive index, density, magnification check, remark, clarity level, color level, aspect ratio, authenticator, auditor, polarization check, pleochromism, image information of the object being authenticated.
Preferably, the reference parameter information of the authenticated object is acquired from the web server pointed by the resolved detection agency website based on the certificate code and the authentication code resolved from the digital image information of the jewelry authentication certificate.
Preferably, in the detecting step, the website of the detecting organization is analyzed based on the two-dimensional code information and/or the letter information in the digital information of the jewelry authentication certificate as the reference organization characteristic information. The outputting step further includes outputting the information on the jewelry authentication certificate acquired from the server to which the resolved detecting mechanism address is directed, if and only if the judgment result of the detecting step is "yes".
Preferably, the detecting step may further include: the method comprises the steps of analyzing a certificate number of an identified object based on digital image information of a jewelry identification certificate, inquiring the number of times of previous inquiry corresponding to the analyzed certificate number from a duplication checking information table, and updating the number of times of previous inquiry corresponding to the certificate number in the duplication checking information table to an original value plus 1. The outputting step may further include outputting information about the jewelry certificate of incredibility or information about the number of times of past inquires of the jewelry certificate of authenticity if the inquired number of times of past inquires is greater than a preset value. Wherein, the duplication checking information table at least comprises the certificate number and the number of times inquired in the past of each detected jewelry identification certificate.
Preferably, the detecting step further comprises: analyzing the certificate number of the authenticated object based on the digital image information of the jewelry authentication certificate, inquiring a past inquiry city and/or past inquiry time corresponding to the analyzed certificate number from the duplicate checking information table, analyzing the current inquiry city where the user request is located according to the IP address information in the user request message for sending the digital image information of the jewelry authentication certificate, and adding the current inquiry city and/or the current inquiry time to the past inquiry city corresponding to the certificate number in the duplicate checking information table. The step of outputting further comprises outputting the information related to the past query city corresponding to the certificate number and the corresponding query time or the past query city with the earliest query time corresponding to the certificate number and the corresponding query time related information, or outputting the information related to the past query city corresponding to the certificate number and the corresponding query time or the past query city with the earliest query time corresponding to the certificate number and the corresponding query time related information only when the number of the queried past cities is greater than a preset value. Wherein, the duplication checking information table at least comprises the certificate number of each detected jewelry identification certificate and the past inquiry city information thereof.
Preferably, the detecting step further comprises: and inquiring the digital image information of the jewelry identification certificate corresponding to the analyzed certificate number from the duplication checking information table, and adding the digital image information of the jewelry identification certificate to the digital image information of the jewelry identification certificate corresponding to the certificate number in the duplication checking information table. The outputting step further comprises prompting the user for information related to the digital image information of the queried jewelry authentication certificate. The duplicate checking information table comprises certificate numbers analyzed during each inquiry and digital image information of corresponding jewelry identification certificates.
In order to solve the above technical problem, an embodiment of the present application further provides a jewelry certificate authority detection system, including: a setting unit that sets mechanism characteristic information of each detection mechanism, stores the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information; an input unit that acquires digital image information of a jewelry authentication certificate; the detection unit analyzes the organization characteristic information based on the digital image information of the jewelry identification certificate and judges whether the analyzed organization characteristic information is in compliance according to the detection organization characteristic information table set by the setting unit; and an output unit that outputs, if the determination result of the detection unit is negative, related information that the jewelry authentication certificate is not authentic, wherein the institution characteristic information refers to information for characterizing the detection institution.
In order to solve the above technical problem, embodiments of the present application also provide a computer-readable storage medium having stored therein a computer program for a method of detecting a jewelry authentication certificate as claimed in the present application.
In order to solve the above technical problem, embodiments of the present application also provide a computer device including a processor, a memory, and a computer program stored on the memory regarding the method of detecting a jewelry authentication certificate as claimed in the present application.
Compared with the prior art, the embodiment of the application overcomes the important defects that the existing system cannot identify the certificate made by a counterfeit organization, and the personal counterfeit certificate is overcome.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
Fig. 1 and 2 are photographs of the front and aspects, respectively, of a fake jewelry certificate of authenticity found by the inventor from a network.
Fig. 3 is a result of the detection of the counterfeit jewelry certificate of authentication shown in fig. 1 and 2 by an authentication system according to the prior art.
Fig. 4 and 5 are photographs of the front and aspects, respectively, of yet another fake jewelry certificate of authenticity found by the inventor from the network.
Fig. 6 is a schematic structural diagram of a detection system according to an embodiment of the present application.
Fig. 7 is a flowchart of a detection method according to an embodiment of the present application.
Fig. 8 shows a flow chart of a detection method of a further embodiment of the present application.
Fig. 9 and 10 each show a flow chart of a prior art.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided with reference to the drawings and examples, so that how to apply the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented. The embodiments of the present invention and the combination of the features of the embodiments without conflict are within the scope of the present invention.
Additionally, the steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions. Also, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
Fig. 6 illustrates a schematic diagram of a jewelry certificate of authenticity detection system according to an embodiment of the present application. The detection system comprises an input unit 10, a detection unit 20, an output unit 30 and a setting unit 40.
The setting unit 40 sets mechanism characteristic information of each detection mechanism. The set mechanism characteristic information is stored in the detection mechanism characteristic information table as reference mechanism characteristic information. The mechanism characteristic information refers to information for characterizing the detection mechanism. When a new qualified inspection facility is present, the operator may add new baseline facility characteristic information via the setup unit 40. The mechanism characteristic information refers to information for characterizing the detection mechanism. The reference mechanism characteristic information includes, but is not limited to, a reference detection mechanism network address, a reference detection mechanism name, a reference address, a reference telephone, and the like.
The input unit 10 acquires digital image information of a jewelry authentication certificate.
The detecting unit 20 analyzes the institution characteristic information based on the digital image information of the jewelry certificate of authenticity, and judges whether or not the analyzed institution characteristic information is compliant based on the detecting institution characteristic information table set by the setting unit 40.
If the judgment result of the detection unit 20 is no, the output unit 30 outputs the relevant information on the irretentiality of the jewelry authentication certificate.
Example one
The detection mechanism characteristic information table is used for storing reference mechanism characteristic information of each detection mechanism. The baseline agency characteristic information may include information for each accreditable detection agency.
Taking fig. 1 as an example, fig. 1 is taken as a jewelry certificate to be detected. By scanning the two-dimensional code in fig. 1 or inputting the number on the certificate in the web browser, the browsing page of the user is switched to the picture shown in fig. 3 in the conventional technology, so that the user cannot be helped to conveniently identify that the certificate is a counterfeit certificate.
The working principle of the present invention will be explained below by taking fig. 1 as an example of a jewelry certificate to be detected.
FIG. 7 shows a flow diagram of a detection method according to one embodiment of the present application.
An output step of outputting, if the judgment result of the detection step is negative, related information about the authenticity of the jewelry authentication certificate, wherein,
the mechanism characteristic information refers to information for characterizing the detection mechanism.
In the setting step S90, the setting unit 40 sets the mechanism characteristic information of each detection mechanism, and stores the set mechanism characteristic information in the detection mechanism characteristic information table as reference mechanism characteristic information. The reference mechanism characteristic information comprises a reference detection mechanism website, a reference detection mechanism name, a reference address, a reference contact telephone, a reference authentication identifier and the like.
In the input step S100, the input unit 10 acquires digital image information of a jewelry authentication certificate. The digital image information of the jewelry identification certificate can be obtained by receiving the photos of the jewelry identification certificate sent by the user from the network through equipment such as a mobile phone terminal, the detection system can prompt the user to obtain the jewelry identification certificate through the modes of photographing or scanning, and the like, and the digital image information can also be read in a local memory. The acquisition mode is various. The detecting step S200 may further include a parsing step S210 and a judging step S220.
In the parsing step S210, institution characteristic information of the detected certificate of authenticity, such as a website of the detection institution, a name of the detection institution, an address, a contact phone, an authentication identifier, etc., is parsed based on the digital image information of the jewelry certificate of authenticity. The organization characteristic information includes, but is not limited to, a detection organization website, a detection organization name, an address and/or a contact information, etc.
In step S210, the detecting unit 20 may analyze organization specific detective information such as the website of the detecting organization including www.gdtczj.com, the organization name "national jewelry detecting center" and the like from the digital image information of the jewelry certificate of fig. 1. The website of the detection mechanism can be obtained by analyzing the two-dimensional code in fig. 1, or by analyzing the letter in fig. 2, or two websites of the detection mechanism can be obtained by analyzing the two-dimensional code and the letter in fig. 2.
In the determining step S220, it is determined whether the detection mechanism website, the detection mechanism name, the address, and/or the mechanism feature information such as the telephone, etc. analyzed by the detection unit 20 are compliant according to the preset detection mechanism feature information table.
In the example of fig. 1 as the jewelry certificate of authenticity to be detected, the website of the testing institution parsed by the testing unit 20 includes www.gdtczj.com. In the present application, a detection mechanism characteristic information table including each qualified detection mechanism is set in advance by the setting unit. Since the web address of any qualified detection institution does not include the domain name gdtczj.com, the web address information of the reference detection institution in the detection institution feature information table does not include "gdtczj.com". Accordingly, the result of the determination in step S220 is that the certificate is not compliant, and the user can be prompted for information about the certificate that is not authentic in step S300.
Compared with the traditional technology, the user is directly guided to the website specified by the certificate to see the set authentication information without exception, the qualified detection mechanism characteristic information table is initiatively preset, and whether the mechanism characteristic information analyzed from the certificate to be detected is in compliance is judged based on the preset reference mechanism characteristic information, so that whether the browsing page of the client is guided to the page to which the certificate attempts to point is judged, and misguiding of the certificate to the user is avoided.
Jewelry is generally expensive and the annual consumption amount is huge. Especially, in recent years, the network jewelry has huge selling amount of money, which causes huge economic loss for common consumers. The invention overcomes the important defects that the existing jewelry identification certificate detection system can not identify the certificate made by a counterfeit organization and/or the personal imitation certificate, and the like, and avoids the property loss of a plurality of common consumers from the technical point of view.
The detection institution characteristic information table may be set by receiving detection institution web address and detection institution name information input by a specific person. Since there are many detection organizations, hundreds of thousands of detection organizations, ordinary consumers and even experts cannot remember names and websites of various authentication organizations very accurately, especially it is difficult to remember their accurate websites, and fake certifiers often cheat people's eyes with names or websites very similar to qualified organizations, so it is very important to set reference organization characteristic information in advance.
In the output step S300, if the judgment result of the detection step S200 is no, the related information on the untrustworthy jewelry authentication certificate is output. In fig. 1 as an example of a jewelry certificate to be detected, the output unit 30 of the present system may prompt the user in S300 that the certificate is a false certificate, thereby avoiding property loss of the user and being more efficient and accurate than finding an expert to detect the certificate.
Similarly, in the determination step S220, the detection unit 20 may resolve the name of the detection institution or any other institution characteristic information based on the digital image information of the jewelry identification certificate, and determine whether the resolved institution characteristic information is compliant according to the corresponding reference detection institution name or any other institution characteristic information in the detection institution characteristic information table.
In the example of fig. 1 as the jewelry certificate to be detected, since the precise name of no qualified testing institution is "national jewelry testing center", this name is intended to be used with some formal qualified institutions and the like to induce consumers. Therefore, the reference detection institution name information of the detection institution characteristic information table does not include the national-level jewelry detection center. Accordingly, the result of the determination in step S220 is that the certificate is not compliant, and the user can be prompted for information about the certificate that is not authentic in step S300.
As still another example, the mechanism characteristic information including the reference detection mechanism website information and the reference detection mechanism name information of each detection mechanism may be set in step S90, and the set mechanism characteristic information may be stored in the detection mechanism characteristic information table as the reference mechanism characteristic information. In the parsing step S210, agency characteristic information including a detection agency website and a detection agency name is parsed based on the digital image information of the jewelry authentication certificate to be authenticated. Then, the website information of the reference detection mechanism corresponding to the resolved detection mechanism name is searched from the detection mechanism characteristic information table, and in the determination step S220, it is determined whether the domain name of the website information of the reference detection mechanism is consistent with the domain name of the resolved detection mechanism website, and if it is determined that the domain names are not consistent, the determination result is no.
In addition, in the parsing step S210, the information of more than one website may be parsed based on the digital image information of the jewelry identification certificate, and any one of the information of more than one website is used as the website of the detection mechanism, so that the more than one website of the detection mechanism may be determined one by one in the determining step, and as long as the determination result of one website of the detection mechanism is negative, the user may be prompted in the outputting step S300 for the relevant information that the certificate is not authentic, so as to play a role in warning and preventing damage in time.
If the determination result in the determination step S220 is yes, the flow may be ended, or the process may continue to the step S230.
In step S230, the feature information of the authenticated object is parsed based on the digital image information of the jewelry authentication certificate to be authenticated. The characteristic information of the object to be authenticated includes weight, shape, name, color, refractive index, density, magnification inspection, remarks, clarity level, color level, aspect ratio, authenticator, auditor, polarization inspection, multi-color, image information of the object to be authenticated, and the like.
Taking fig. 1 as an example, fig. 1 is taken as a jewelry certificate to be detected. The characteristic information of the identified object with the weight of 55 g, the shape of bracelet, the density of 3.33 and the like can be analyzed, and is not listed one by one here.
In particular, the bracelet image at the upper right part of the figure 1 can be extracted through the extraction technology to be used as the image information of the identified object.
Reference characteristic information of the authenticated object is acquired in S240. More specifically, the reference feature information of the authenticated object corresponding to the feature information of the analyzed authenticated object is acquired from the server to which the analyzed web address of the detection institution points. The reference feature information of the object to be authenticated includes weight, shape, name, color, refractive index, density, magnification inspection, remarks, clarity level, color level, aspect ratio, authenticator, examiner, polarization inspection, polychromatism, image information of the object to be authenticated, and the like, and corresponds to the image information of the object to be authenticated analyzed from the digital image information of each jewelry authentication certificate. In other words, the reference characteristic information of the authenticated object is stored in the server of the authentication system of each authentication institution, and the system acquires each reference characteristic information of the authenticated object from the server of the authentication institution to which the website information of the authentication institution analyzed in S210 points. And then proceeds to step S250.
Optionally, in S240, the certificate code and the verification code of the jewelry certificate to be authenticated are resolved from the digital image information of the jewelry certificate to be authenticated, and each reference parameter information of the authenticated object is obtained from the network server pointed by the resolved website of the detection authority according to the certificate code and the verification code.
Optionally, in S240, each piece of reference parameter information of the object to be authenticated may be directly obtained from the web page pointed by the website information of the authentication authority parsed in S210 without parsing the certificate code and the verification code.
In S250, it is determined whether or not the feature information of the authenticated object analyzed in step S230 matches the reference feature information of the corresponding authenticated object acquired in step S240, and if it is determined to be "no", information on the relationship that the jewelry authentication certificate is not authentic is output.
OTHER EMBODIMENTS
In yet another embodiment of the present invention, a duplication checking information table may be further established, wherein the duplication checking information table at least includes the certificate number and the number of times of previous inquiry of each detected jewelry certificate.
After the detecting unit 20 parses the certificate number of the jewelry identification certificate to be authenticated in step S240, the number of times of past queries corresponding to the parsed certificate number may be further queried from the duplication checking information table. If the inquired past inquired times is greater than a preset value, the output unit 30 outputs information about the invisibility of the jewelry certificate of authentication or information about the past inquired times of the jewelry certificate of authentication. For example, the output unit may prompt the user that "the certificate is queried N times, there is a certain possibility of being copied multiple copies". Thus, the user may be alerted that the certificate may be a duplicate of a genuine certificate, or that the genuine certificate has been duplicated in multiple copies.
Some bad businessmen may use a similar genuine pearl treasure to go to an authority to make a genuine certificate in order to equip counterfeit jewels with certificates, and then copy the genuine certificate, and display the copied certificate and counterfeit jewels together for common consumers to see. This is very fraudulent for the average consumer. In this embodiment, by counting the number of past queries, a general consumer can easily alert that the certificate is a frequently queried certificate, and may have been copied and therefore frequently queried.
After the number of times of past inquiry corresponding to the analyzed certificate number is inquired from the duplication checking information table, the number of times of past inquiry corresponding to the certificate number in the duplication checking information table can be updated to an original value plus 1 to update the duplication checking information table.
In another embodiment of the present invention, the duplication checking information table may include information on past times of inquiry and/or past inquiry times, in addition to the certificate number and the past inquiry times of each detected jewelry authentication certificate.
After the detection unit 20 parses the certificate number of the jewelry identification certificate to be authenticated in step S240, or after the number of times of past queries corresponding to the parsed certificate number is queried from the duplication checking information table, the detection unit also queries the city of past queries and/or the time of past queries corresponding to the parsed certificate number from the duplication checking information table. Then, the output unit 30 presents the inquired past inquiry city and/or past inquiry time to the user, or outputs information on the past inquiry city with the earliest inquiry time corresponding to the certificate number and its corresponding inquiry time, or may present such a presentation only when the number of past inquiries is greater than a preset value.
The jewelry has strong investment attribute, the advantage of producing area is obvious, and the processes of collection, pledge, transfer, presentation and the like are available in the middle. The circulation process itself is also an important basis for the evaluation of the truth and the value of the multiple pearls, which is ignored by the query systems in the prior art. Sellers often dictate the "appearance" of a piece of jewelry when selling that piece of jewelry to increase the appeal of that piece of jewelry. However, the dictation of the seller is often not followed, and the past authentication systems have ignored this. The embodiment just utilizes the characteristic that a buyer can inquire the authenticity of the certificate after buying a piece of jewelry, and records the 'life' of the jewelry so as to facilitate the user to judge the real circulation condition of the jewelry. The former inquired city is displayed to the user, so that the buyer can conveniently judge whether the jewelry is a new product or changes hands for many times, particularly whether the seller introduces the product (such as old and new products, the location of the product, the source of the product and the like) is true or not, and the like, and the non-honest behavior of the jewelry trader is often associated with counterfeiting. In addition, the system shows that the certificate has been queried in a very large number of cities, and may also alert the user to a high risk of being duplicated.
After the previous query city corresponding to the analyzed certificate number is queried from the duplicate checking information table, the current query city where the user request is located is analyzed according to the IP address information in the user request message for sending the digital image information of the jewelry identification certificate, and the current query city is added to the previous query city corresponding to the certificate number in the duplicate checking information table so as to update the duplicate checking information table.
In another embodiment of the present invention, the duplication checking information table may include digital image information of the previous jewelry certificate in addition to information such as a certificate number and a number of times of previous inquiry, a previous inquiry city, and/or a previous inquiry time of each detected jewelry certificate.
In step S240, the digital image information of the certificate is also identified from the numbered jewelry, which greatly facilitates the user to compare whether the image submitted by the user before is consistent with the current certificate in his/her own hand, and if not, the user can be intuitively reminded that one of the certificates is obviously false.
It will be appreciated by those skilled in the art that the foregoing embodiments of the present application provide apparatus and/or system components, and method steps, that may be focused on reviewing the digital image information of the jewelry certificate of authenticity that corresponds to the parsed certificate number. The user is prompted for information related to the digital image information of the queried jewelry authentication certificate. And then adding the digital image information of the current jewelry identification certificate to the digital image information of the previous jewelry identification certificate corresponding to the certificate number in the duplication checking information table, and updating the duplication checking information table.
In still another embodiment of the present invention (refer to fig. 8), if and only if the determination result of the detection step S220 is "yes", the output unit 30 further outputs information on the jewelry certificate of authenticity acquired from the server to which the web address of the detection institution is directed by the parsing (step S400), and the reference of the user on the aspect is in agreement with the information of the written certificate of authenticity in the hand of the user.
The digital image information of the jewelry appraisal certificates input by the users is stored, and when the users inquire the certificates with the same number, the calculation devices with the same certificates input by the users are displayed to the users, or the calculation devices are distributed on a network formed by a plurality of calculation devices. Alternatively, they may be implemented in program code executable by a computing device. Thus, they may be stored in a memory device for execution by a computing device, or they may be separately fabricated as individual integrated circuit modules, or multiple modules or steps thereof may be fabricated as a single integrated circuit module for implementation. Thus, the present invention is not limited to any specific combination of hardware and software.
Yet another embodiment of the present invention includes a computer readable storage medium having stored therein a computer program for a method of detecting a jewelry authentication certificate as claimed in the present application.
Yet another embodiment of the present invention comprises a computer apparatus comprising a processor, a memory, and a computer program stored on the memory relating to a method of detecting a jewelry authentication certificate as claimed in the present application.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be apparent to those skilled in the art that various modifications and variations can be made in the form and details of the present invention without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (12)

1. A method of detecting a jewelry certificate of authenticity, comprising:
a setting step of setting mechanism characteristic information of each detection mechanism, and storing the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information;
an input step of acquiring digital image information of the jewelry authentication certificate;
a detection step of analyzing organization characteristic information based on the digital image information of the jewelry identification certificate, and judging whether the analyzed organization characteristic information is in compliance according to the detection organization characteristic information table set in the setting step;
an output step of outputting, if a judgment result of the detection step is "no", related information on the jewelry authentication certificate not being authentic, wherein,
the mechanism characteristic information refers to information for characterizing the detection mechanism.
2. The method of claim 1, wherein,
the setting step further comprises setting mechanism characteristic information of each detection mechanism, including website information and/or name information of the reference detection mechanism, and storing the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information;
the detecting step further comprises:
analyzing organization characteristic information comprising a detection organization website and/or a detection organization name based on the digital image information of the jewelry authentication certificate,
judging whether the domain name and/or the detection mechanism name of the analyzed detection mechanism website is contained in the reference detection mechanism website information of the detection mechanism characteristic information table,
if the analyzed detection mechanism website is judged to be in compliance, otherwise, the analyzed detection mechanism website is judged not to be in compliance.
3. The method of claim 1, wherein the detecting step further comprises:
the setting step further includes setting mechanism characteristic information including reference detection mechanism website information and reference detection mechanism name information of each detection mechanism, and storing the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information;
analyzing organization characteristic information comprising a detection organization website and a detection organization name based on the digital image information of the jewelry identification certificate;
searching the website information of the reference detection mechanism corresponding to the analyzed detection mechanism name from the characteristic information table of the detection mechanism,
and judging whether the domain name of the website information of the reference detection mechanism is consistent with the analyzed domain name of the website of the detection mechanism, if the domain name is inconsistent, judging that the judgment result of the detection step is negative.
4. The method of claim 2, wherein if the determination result of the detecting step is yes, the detecting step further comprises:
analyzing characteristic information of the object to be authenticated based on the digital image information of the jewelry authentication certificate;
acquiring reference characteristic information of the identified object corresponding to the analyzed characteristic information of the identified object from the server pointed by the analyzed website of the detection mechanism;
further judging whether the analyzed feature information of the identified object is consistent with the reference feature information of the corresponding identified object, if not, outputting related information that the jewelry identification certificate is not authentic,
wherein the content of the first and second substances,
the characteristic information of the authenticated object and the reference characteristic information of the authenticated object include at least one or more of the following parameters:
weight, shape, name, color, refractive index, density, magnification check, remark, clarity level, color level, aspect ratio, evaluator, auditor, polarization check, pleochromism, image information of the object being evaluated.
5. The method of claim 4, wherein,
and acquiring reference parameter information of the object to be authenticated from the network server pointed by the analyzed detection mechanism website based on the certificate code and the verification code analyzed from the digital image information of the jewelry authentication certificate.
6. The method of claim 1, wherein
In the detection step, analyzing a detection mechanism website based on two-dimensional code information and/or letter information in the digital information of the jewelry identification certificate as reference mechanism characteristic information;
the outputting step further includes outputting the information on the jewelry authentication certificate acquired from the server to which the resolved detection agency site is directed, if and only if the determination result of the detecting step is "yes".
7. The method of any one of claims 1 to 5,
the step of detecting may further comprise the step of,
resolving a certificate number of the authenticated object based on the digital image information of the jewelry authentication certificate,
the number of times of past inquiry corresponding to the analyzed certificate number is inquired from the duplication checking information table,
updating the number of times which is inquired in the past and corresponds to the certificate number in the duplication checking information table to be an original value plus 1;
the outputting step further includes outputting information about the jewelry authentication certificate being not authentic or information about the number of past inquired times of the jewelry authentication certificate if the inquired number of past inquired times is greater than a preset value,
wherein the content of the first and second substances,
the duplication checking information table at least comprises the certificate number and the number of times inquired in the past of each detected jewelry identification certificate.
8. The method of any one of claims 1 to 5,
the step of detecting may further comprise the step of,
resolving a certificate number of the authenticated object based on the digital image information of the jewelry authentication certificate,
the former inquiry city and/or former inquiry time corresponding to the analyzed certificate number are inquired from the duplicate checking information table,
analyzing the current inquiry city where the user request is according to the IP address information in the user request message for sending the digital image information of the jewelry identification certificate,
adding the current inquiry city and/or the current inquiry time to the past inquiry city corresponding to the certificate number in the duplication checking information table;
the step of outputting further comprises outputting information related to the past query city corresponding to the certificate number and corresponding query time or the past query city with the earliest query time corresponding to the certificate number and corresponding query time related information, or outputting information related to the past query city corresponding to the certificate number and corresponding query time or the past query city with the earliest query time corresponding to the certificate number and corresponding query time related information only when the number of the queried past cities is greater than a preset value;
wherein, the duplication checking information table at least comprises the certificate number of each detected jewelry certificate and the past inquiry city information thereof.
9. The method of any one of claims 1 to 5,
the step of detecting further comprises the step of,
digital image information of the jewelry identification certificate corresponding to the analyzed certificate number is inquired from the duplication checking information table,
adding the digital image information of the jewelry identification certificate to the digital image information of the jewelry identification certificate corresponding to the certificate number in a duplication checking information table;
the outputting step further includes prompting the user for information related to the digital image information of the queried jewelry authentication certificate,
the duplication checking information table comprises certificate numbers analyzed during each inquiry and digital image information of corresponding jewelry identification certificates.
10. A jewelry certificate of authenticity detection system comprising:
a setting unit that sets mechanism characteristic information of each detection mechanism, stores the set mechanism characteristic information in a detection mechanism characteristic information table as reference mechanism characteristic information;
an input unit that acquires digital image information of the jewelry authentication certificate;
the detection unit analyzes the mechanism characteristic information based on the digital image information of the jewelry identification certificate and judges whether the analyzed mechanism characteristic information is in compliance according to the detection mechanism characteristic information table set by the setting unit;
an output unit that outputs related information on the jewelry authentication certificate not being authentic, if a judgment result of the detection unit is negative, wherein,
the mechanism characteristic information refers to information for characterizing the detection mechanism.
11. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed, implements the steps of the method according to any one of claims 1-9.
12. A computer arrangement comprising a processor, a memory and a computer program stored on the memory, characterized in that the steps of the method according to any of claims 1-9 are implemented when the computer program is executed by the processor.
CN202110284749.3A 2021-03-17 2021-03-17 Method and system for detecting jewelry certificate of authentication Pending CN113313499A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110284749.3A CN113313499A (en) 2021-03-17 2021-03-17 Method and system for detecting jewelry certificate of authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110284749.3A CN113313499A (en) 2021-03-17 2021-03-17 Method and system for detecting jewelry certificate of authentication

Publications (1)

Publication Number Publication Date
CN113313499A true CN113313499A (en) 2021-08-27

Family

ID=77372021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110284749.3A Pending CN113313499A (en) 2021-03-17 2021-03-17 Method and system for detecting jewelry certificate of authentication

Country Status (1)

Country Link
CN (1) CN113313499A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114781414A (en) * 2022-03-17 2022-07-22 国家珠宝检测中心(广东)有限责任公司 Jewelry terminal machine and jewelry certificate self-service query method and storage medium thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2015149A2 (en) * 2007-06-22 2009-01-14 Deutsche Schmuck und Uhren GmbH Watches, jewellery and system for checking their authenticity
CN104079587A (en) * 2014-07-21 2014-10-01 深圳天祥质量技术服务有限公司 Certificate identification device and certificate check system
CN106295741A (en) * 2016-08-09 2017-01-04 中国科学院计算机网络信息中心 Method for anti-counterfeit and system
CN109801088A (en) * 2019-04-03 2019-05-24 上海中商网络股份有限公司 Antiforge method for commodities, device, server and storage medium
CN109960996A (en) * 2018-06-15 2019-07-02 深圳市云钻科技有限公司 It is a kind of to judge jewelry product system and method whether corresponding with certificate
CN112464968A (en) * 2019-09-09 2021-03-09 褚海威 Rapid seal authentication method, server and user terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2015149A2 (en) * 2007-06-22 2009-01-14 Deutsche Schmuck und Uhren GmbH Watches, jewellery and system for checking their authenticity
CN104079587A (en) * 2014-07-21 2014-10-01 深圳天祥质量技术服务有限公司 Certificate identification device and certificate check system
CN106295741A (en) * 2016-08-09 2017-01-04 中国科学院计算机网络信息中心 Method for anti-counterfeit and system
CN109960996A (en) * 2018-06-15 2019-07-02 深圳市云钻科技有限公司 It is a kind of to judge jewelry product system and method whether corresponding with certificate
CN109801088A (en) * 2019-04-03 2019-05-24 上海中商网络股份有限公司 Antiforge method for commodities, device, server and storage medium
CN112464968A (en) * 2019-09-09 2021-03-09 褚海威 Rapid seal authentication method, server and user terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
珠宝第一课堂: "买珠宝连鉴定证书都不懂?", Retrieved from the Internet <URL:《www.sohu.com/a/237554681_651499》> *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114781414A (en) * 2022-03-17 2022-07-22 国家珠宝检测中心(广东)有限责任公司 Jewelry terminal machine and jewelry certificate self-service query method and storage medium thereof

Similar Documents

Publication Publication Date Title
AU2019295815B2 (en) Blockchain-based data verification method and apparatus, and electronic device
US11941644B2 (en) Method of providing real asset authentication service using decentralized identifier and non-fungible token
US20180350180A1 (en) Computerized voting system
US10201939B1 (en) Product authenticity verification system
CN105701673B (en) A kind of false proof source tracing method of wrist-watch based on Quick Response Code and system
CN110457957A (en) Information processing method, device, electronic equipment and the medium of electronic bill
US20230007937A1 (en) Identifying electronic devices using temporally changing information
US10445330B2 (en) Computerized technical authentication and grading system for collectible objects
US20100312799A1 (en) System and method for matching similar master data using associated behavioral data
CN108197957A (en) A kind of method for anti-counterfeit and system based on block chain
CN110309388A (en) The illegal Risk Identification Method of data object information, device and computer system
CN105894380A (en) Digital currency credit investigation system and method
US10552697B2 (en) Systems, devices, and methods for identifying user data
CN104753909B (en) Method for authenticating after information updating, Apparatus and system
CN113313499A (en) Method and system for detecting jewelry certificate of authentication
CN111340515A (en) Characteristic information generation and article tracing method and device
CN112000862B (en) Data processing method and device
CN107341461B (en) Method and system for identifying authenticity of artwork through intelligent recognition and analysis technology
CN111047146B (en) Risk identification method, device and equipment for enterprise users
US20170039627A1 (en) Cigar Band Recognition Interface
WO2012154017A9 (en) Method for verifying the authenticity of securities and device for its realization
CN108734484A (en) Jewelry identity information input method and system, jewelry identity identifying method and system
TWI766408B (en) A method for verifying product authenticity and establishing authorized product data by fabric characteristics
CN105989391A (en) Anti-fake system and anti-fake sticker
RU2778460C1 (en) Method and apparatus for clustering phishing web resources based on an image of the visual content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination