CN113326906A - In-code isolated point sawtooth anti-counterfeiting method - Google Patents

In-code isolated point sawtooth anti-counterfeiting method Download PDF

Info

Publication number
CN113326906A
CN113326906A CN202110382530.7A CN202110382530A CN113326906A CN 113326906 A CN113326906 A CN 113326906A CN 202110382530 A CN202110382530 A CN 202110382530A CN 113326906 A CN113326906 A CN 113326906A
Authority
CN
China
Prior art keywords
code
isolated
ink dots
characteristic information
counterfeiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110382530.7A
Other languages
Chinese (zh)
Inventor
陈明发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Paipaikan Information Technology Co ltd
Original Assignee
Hainan Paipaikan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Paipaikan Information Technology Co ltd filed Critical Hainan Paipaikan Information Technology Co ltd
Publication of CN113326906A publication Critical patent/CN113326906A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Printing Methods (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The application discloses an intra-code isolated point sawtooth anti-counterfeiting method which comprises the steps of analyzing an anti-counterfeiting identification request submitted by a user terminal to obtain shape characteristic information of isolated ink points in a target code; checking the shape characteristic information by using the record information in the preset database to obtain a checking result, and feeding the checking result back to the user terminal; the record information comprises a product code and shape characteristic information of isolated ink dots obtained by scanning the product code; each product code is provided with a preset number of isolated ink dots, and the isolated ink dots are randomly micro-diffused in the product code to generate sawteeth and deform; the method can avoid preprinting a diffusant coating, simplify the printing production process, reduce the printing manufacturing difficulty, stabilize the printing quality, improve the anti-counterfeiting inspection speed and accuracy and improve the user experience of consumers.

Description

In-code isolated point sawtooth anti-counterfeiting method
Technical Field
The application relates to the technical field of information inquiry anti-counterfeiting, in particular to an in-code isolated point sawtooth anti-counterfeiting method.
Background
The Chinese patent 'mobile phone identification code sawtooth anti-counterfeiting method (CN 104794629B)', authorizes a sawtooth anti-counterfeiting method of the applicant, and comprises the steps of printing codes or/and pictures and texts on a printing stock, and enabling the edges of the codes or/and the pictures and texts to randomly generate personalized sawteeth; amplifying and shooting the printed codes or/and the pictures and texts to obtain sawtooth characteristic information and codes by shooting; the sawtooth characteristic information obtained by amplifying and shooting and the corresponding code are stored and filed in an anti-counterfeiting checking system database accessed to the Internet to serve as anti-counterfeiting characteristic filing information for the public to check the authenticity by using the smart phone. In order to enable the existing camera mobile phone (i.e. smart phone) with the lens resolution of more than or equal to 800 ten thousand pixels in the hands of the vast consumers to identify the saw teeth, the size S of the saw teeth is optimized in the patent specification, and the size S of the saw teeth is set to be 0.3mm multiplied by 0.3mm to be more than or equal to S to be more than or equal to 0.05mm multiplied by 0.05 mm. In order to enlarge the sawteeth as much as possible so that smart phones with various lens resolutions can be identified, patent specifications from paragraph [0014] to paragraph [0024] innovate more than ten kinds of production and manufacturing methods for enlarging the sawteeth. The practical summary shows that: the most stable, versatile and practical solution for expanding serrations is the manufacturing solution in paragraph [0117] of the third embodiment of the patent specification: a coating of diffusing agent is printed in advance, and then codes or/and graphics are printed on the coating of diffusing agent to promote the rapid diffusion of the undried ink, so that the large sawtooth with the diameter of about 0.3mm multiplied by 0.3mm is formed. However, the scheme of preprinting the diffusant coating needs to occupy one printing unit, and for many current code-spraying printing units, no redundant printing unit is used for preprinting the diffusant coating, which causes great difficulty in printing production.
The study showed that: the large saw teeth with the size of about 0.3mm multiplied by 0.3mm are manufactured in the two-dimensional code, the production quality is difficult to control, the two-dimensional code reading rate is easy to reduce, and even the two-dimensional code can not be read. In order to avoid interference of larger sawteeth on the identification and reading of the two-dimensional code, the inventor of the application develops an over-limit ink dot anti-counterfeiting method and a printed matter (CN 109711511A). the method comprises the steps of printing the two-dimensional code on a product, printing an ink dot matrix beside the two-dimensional code, randomly moistening the ink dot matrix to deform the ink dot matrix into an ink block dot matrix with a random shape, amplifying and shooting the ink block dot matrix to obtain shape characteristic information of the ink block, and taking the characteristic information of the ink block as an anti-counterfeiting characteristic information file; when the consumer checks the authenticity, the dot matrix of the ink block is shot by a mobile phone, and the characteristic information of the ink block is matched with the anti-counterfeiting characteristic information file so as to identify the authenticity. In order to develop an improved technical scheme which does not need to be modified and does not interfere the recognition and reading of the two-dimensional code, the inventor of the application also develops a code edge sawtooth anti-counterfeiting method and a product (CN112101500A and CN110866579A), wherein the method comprises the step of printing the two-dimensional code on a printed matter (the two-dimensional code is usually printed by black and white ink blocks); printing some sparse isolated ink dots in a blank area with the width of 0-2 mm near the two-dimensional code; promoting the ink of the isolated ink dots to randomly diffuse to form sawteeth; the two-dimensional code is shot in an amplification mode to obtain microscopic characteristic information of the sawtooth; and correspondingly storing the acquired microscopic characteristic information and the two-dimensional code into an anti-counterfeiting checking system database to serve as an anti-counterfeiting characteristic information file.
The implementation practice proves that: the best stable embodiments of the applicant's four patents mentioned above, all require preprinting of the diffuser coating, which poses great difficulties in the production of the printing.
Disclosure of Invention
The sawtooth anti-counterfeiting method can avoid preprinting of a diffusant coating, simplify the printing production process, reduce the printing manufacturing difficulty, stabilize the printing quality, improve the anti-counterfeiting inspection speed and accuracy and improve the user experience of consumers.
The application provides an in-code isolated point sawtooth anti-counterfeiting method, which comprises the following steps:
analyzing an anti-counterfeiting identification request submitted by a user terminal to obtain shape characteristic information of isolated ink dots in a target code;
checking the shape characteristic information by using the record information in a preset database to obtain a checking result, and feeding the checking result back to the user terminal;
wherein the filing information comprises a product code and shape characteristic information of isolated ink dots obtained by scanning the product code; each product code is provided with a preset number of the isolated ink dots, and the isolated ink dots are randomly micro-diffused in the product code to generate saw teeth and deform.
Preferably, the checking the shape feature information by using the record information in the preset database to obtain a checking result, and feeding back the checking result to the user terminal includes:
when the shape characteristic information of the isolated ink dots exceeding the first preset proportion accords with the record information, the conclusion information that the checking result is true is fed back to the user terminal;
and when the shape characteristic information of the isolated ink dots which do not exceed the first preset proportion conforms to the record information, feeding back conclusion information that the inspection result is false to the user terminal.
Preferably, the code inner isolated point sawtooth anti-counterfeiting method further comprises the following steps:
and when the shape characteristic information of the isolated ink dots which exceed the first preset proportion and do not exceed the second preset proportion conforms to the record information, sending a rescanning prompt to the user terminal.
Preferably, the width of the isolated dots is 0.55mm to 1.2 mm.
Preferably, the product code is a two-dimensional code, and the isolated ink dots are inserted from the outside of the two-dimensional code body and are independent of each ink block in the two-dimensional code body.
Preferably, the product code is a two-dimensional code, and the isolated ink dots are separated by disconnecting the joints of adjacent ink blocks in the two-dimensional code body.
Preferably, the product code is a two-dimensional code, and the isolated ink dots are arranged in rows and/or columns and are located at the edge of the two-dimensional code.
The method for the sawtooth anti-counterfeiting of the isolated points in the code comprises the steps of analyzing an anti-counterfeiting identification request submitted by a user terminal to obtain shape characteristic information of the isolated ink points in a target code; checking the shape characteristic information by using the record information in a preset database to obtain a checking result, and feeding the checking result back to the user terminal; wherein the filing information comprises a product code and shape characteristic information of isolated ink dots obtained by scanning the product code; each product code is provided with a preset number of the isolated ink dots, and the isolated ink dots are randomly micro-diffused in the product code to generate saw teeth and deform.
Therefore, the intra-code isolated point sawtooth anti-counterfeiting method provided by the application can omit preprinting diffusant coating, does not need to specially enlarge isolated points which are greatly deformed due to micro diffusion generated by natural infiltration of printing stocks such as sawteeth and copper plate paper on code spraying ink, can be mostly identified by an isolated point shape identification algorithm model, simplifies the production process, reduces the manufacturing difficulty and stabilizes the product quality. In addition, because isolated ink dots can be hidden in the two-dimensional code and can not be noticed without attention, the appearance of the printed matter is not damaged, and the edition change is not needed.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be obvious to those skilled in the art that other drawings can be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
Fig. 1 is a schematic flow chart of an intra-code isolated point sawtooth anti-counterfeiting method provided by the present application;
fig. 2 is a schematic plan view of a two-dimensional code in the prior art;
FIG. 3 is a schematic plan view of a first product code provided herein;
FIG. 4 is a schematic plan view of a second product code provided herein;
FIG. 5 is a schematic plan view of a third product code provided herein;
FIG. 6 is a plan view of a fourth product code provided herein;
FIG. 7 is a schematic plan view of a fifth product code provided herein;
FIG. 8 is a schematic plan view of a sixth product code provided herein;
FIG. 9 is a schematic plan view of a seventh product code provided herein;
the reference numbers illustrate: 1-isolated ink dots, 2-coding, 3-narrowest junctions.
Detailed Description
The core of the application is to provide the in-code isolated point sawtooth anti-counterfeiting method, the sawtooth anti-counterfeiting method can avoid preprinting a diffusant coating, simplify the printing production process, reduce the printing manufacturing difficulty, stabilize the printing quality, improve the anti-counterfeiting inspection speed and accuracy and improve the user experience of consumers.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a schematic flow chart of an intra-code isolated point sawtooth anti-counterfeiting method provided in the present application, where the sawtooth anti-counterfeiting method includes:
s101: analyzing an anti-counterfeiting identification request submitted by a user terminal to obtain shape characteristic information of isolated ink dots in a target code;
s102: checking the shape characteristic information by using the record information in the preset database to obtain a checking result, and feeding the checking result back to the user terminal;
the record information comprises a product code and shape characteristic information of isolated ink dots obtained by scanning the product code; each product code is provided with a preset number of isolated ink dots, and the isolated ink dots are randomly and micro-diffused in the product code to generate sawteeth and deform.
The intra-code isolated point sawtooth anti-counterfeiting method provided by the embodiment of the application aims to realize anti-counterfeiting identification of a product by arranging isolated ink points in a product code. Specifically, at least one unique code is printed on each printed matter on each product which is delivered from a factory, and the code can be a two-dimensional code for example; further, a preset number of isolated ink dots are arranged on the code, so that each isolated ink dot generates sawtooth and deformation in a random micro-diffusion mode, and it can be understood that the ink inevitably generates random micro-diffusion on a paper surface before drying, for example, when the isolated ink dots are printed on a coated paper, micro-diffusion deformation can be generated even if a diffusion agent coating is not pre-printed, 10-60% of the isolated ink dots with the width of 0.25-0.95 mm can be deformed, and the exponential change of the area value of the isolated ink dots is enlarged. Therefore, before the product is put on the market, the shape characteristic information of each deformed isolated ink dot in each product code can be collected, and the shape characteristic information and the corresponding product code are stored into a preset database together as record information so as to realize the anti-counterfeiting identification of the corresponding product.
Wherein, the specific values of the preset number N are defined as follows: n is more than or equal to 12 or 24 or 36 or 48 or 60 or 72 or 80 or 92 or 100 or 200 or 300. It can be understood that the more the total number of the isolated ink dots of each code is, the easier the identification is and the more difficult the forgery is, and the technical scheme that 36-72 isolated ink dots are allocated to each code can be obtained through tests, so that the user identification is the most rapid and the checking conclusion is reliable.
Wherein, the setting position of the isolated ink point in the code, the shape, the size and the like are limited as follows: the width of the isolated dots is set to 0.55mm to 1.2 mm. It should be noted that the width parameter is an optimal parameter obtained after a large number of tests, and after the tests, for isolated ink dots with a width (including a diameter) smaller than 0.55mm and isolated ink dots with a width larger than 1.2mm, when a simulation test user uploads the acquired feature information to be detected of the isolated ink dots of the positive sample to an anti-counterfeiting inspection system and performs matching identification on the isolated ink dots by using an isolated dot shape identification algorithm model, the identification accuracy is only 50-70%, and hardly reaches 100%. The orphan shape recognition algorithm model may be a model based on a DNN Neural network (Deep Neural network), among others.
Further, the anti-counterfeiting authentication process for a certain product can comprise the following steps: firstly, a user can utilize a user terminal (such as a mobile phone, a flat panel and the like) with a scanning function to scan codes (namely the target codes) on printed matters of products to be identified, so as to obtain shape characteristic information of each isolated ink dot in the target codes, and therefore, an anti-counterfeiting identification request can be generated based on the information and sent to an anti-counterfeiting identification system for checking; further, for the anti-counterfeiting identification system, when the anti-counterfeiting identification system receives an anti-counterfeiting identification request, the shape characteristic information of each isolated ink point in the target code can be obtained from the anti-counterfeiting identification request through a request analysis function, so that an inspection result can be obtained by matching and analyzing the anti-counterfeiting identification system with the record information in the preset database, and finally, the inspection result is fed back to the user terminal.
As a preferred embodiment, the checking the shape feature information by using the record information in the preset database to obtain the checking result, and feeding the checking result back to the user terminal may include: when the shape characteristic information of the isolated ink dots exceeding the first preset proportion accords with the record information, the conclusion information that the checking result is true is fed back to the user terminal; and when the shape characteristic information of the isolated ink dots which do not exceed the first preset proportion accords with the record information, feeding back the conclusion information that the inspection result is false to the user terminal.
The preferred embodiment provides a specific feedback method for the inspection result, namely, a rounding strategy that most of isolated ink points are consistent with recorded information is adopted to give out an identification conclusion, and feedback is carried out, so that the accuracy is high. Therefore, when the number of the isolated ink dots which are consistent with the record information in the target code reaches a preset proportion (a first preset proportion), the tested product corresponding to the target code can be judged to be a genuine product, and therefore, the conclusion information that the checking result is true can be fed back to the user terminal; otherwise, when the number of the isolated ink dots which are consistent with the record information in the target code does not reach the first preset proportion, the detected product corresponding to the target code can be judged to be a fake product, and therefore, the conclusion information that the checking result is fake can be fed back to the user terminal, and the feedback of the checking result is completed.
The specific value of the first preset proportion is not unique, and the application does not limit the specific value, optionally, the first preset proportion may be set to be 60%, that is, when the shape feature information of more than 60% of the isolated dots in the target code matches the record information, the conclusion information that the inspection result is true may be fed back to the user terminal, and when the shape feature information of less than 60% of the isolated dots in the target code matches the record information, the conclusion information that the inspection result is false may be fed back to the user terminal.
It should be noted that, similarly to the width parameter, the value of the first preset proportion of 60% is also a preferred parameter obtained after a plurality of tests. Because the brightness of the code scanning environment of the user is different and the code scanning actions are different, when the simulation test user uploads the acquired characteristic information to be detected of isolated ink points of the positive sample to the anti-counterfeiting inspection system and carries out matching identification by using the isolated point shape identification algorithm model, the identification accuracy statistical result is 85-100%, and the identification accuracy statistical result of the slightly diffused positive sample is 90-100%. When the simulation test user uploads the acquired to-be-detected characteristic information of the isolated ink dots of the one-code multi-print negative sample to the anti-counterfeiting inspection system and performs matching identification by using the isolated dot shape identification algorithm model, the shape conformity rate of the isolated ink dots is 3-51% (namely the counterfeiting success rate is only 3-51%). In other words, a code multi-stamp counterfeit product using the same processing equipment and materials will fail to forge 49-97% of isolated ink dots due to natural diffusion and will be identified by the isolated dot shape recognition algorithm model. Therefore, the strategy that the shape characteristic information of 0-60% of the isolated ink dots is set to be consistent, and the anti-counterfeiting checking system feeds back the conclusion information of which the identification conclusion is false to the smart phone is scientific and certain.
It can be understood that, because a few isolated ink dots with wrong identification are omitted by the rounding strategy and are not fed back to the user terminal of the consumer, the authentication conclusion sensed by the consumer is high in accuracy and the consumer experience is good.
As a preferred embodiment, the method for anti-counterfeiting the isolated point sawtooth in the code may further include: and when the shape characteristic information of the isolated ink dots which exceed the first preset proportion and do not exceed the second preset proportion conforms to the record information, sending a rescanning prompt to the user terminal.
In order to further improve the accuracy of the inspection result, the preferred embodiment provides a rescanning secondary identification method. Specifically, a second preset proportion may be set, and when the shape feature information of the isolated dots exceeding the first preset proportion and not exceeding the second preset proportion matches the record information, a rescanning prompt is sent to the user terminal, so that the user terminal rescans the target code to obtain the shape feature information of the isolated dots, and performs secondary authentication, thereby obtaining a more accurate authentication result. For example, the first preset ratio may be set to 60%, and the second preset ratio may be set to 80%, so that when the shape feature information of more than 60% and less than 80% of the isolated dots in the target code matches the record information, a rescan prompt is sent to the user terminal. Of course, the above value is only one implementation manner provided in the preferred embodiment, and is not exclusive, and the proportional interval may also be set to be 61% to 69%, 61% to 84%, 61% to 94%, or the like.
Therefore, the intra-code isolated point sawtooth anti-counterfeiting method provided by the application can omit preprinting diffusant coating, does not need to specially enlarge isolated points which are greatly deformed due to micro diffusion generated by natural infiltration of printing stocks such as sawteeth and copper plate paper on code spraying ink, can be mostly identified by an isolated point shape identification algorithm model, simplifies the production process, reduces the manufacturing difficulty and stabilizes the product quality. In addition, because isolated ink dots can be hidden in the two-dimensional code and can not be noticed without attention, the appearance of the printed matter is not damaged, and the edition change is not needed.
On the basis of the above embodiments:
as a preferred embodiment, the product code may be a two-dimensional code, and the isolated ink dots are inserted from the outside of the two-dimensional code body and are independent from each ink block in the two-dimensional code body.
As a preferred embodiment, the product code may be a two-dimensional code, and the isolated ink dots are separated by disconnecting the joints of adjacent ink blocks in the two-dimensional code.
As a preferred embodiment, the product code may be a two-dimensional code, and the isolated ink dots are arranged in rows and/or columns and located at an edge of the two-dimensional code.
Based on the above preferred embodiments, the present application provides the following specific types of product codes.
First, the first product code:
referring to fig. 2 and fig. 3, fig. 2 is a schematic plan view of a two-dimensional code in the prior art, and fig. 3 is a schematic plan view of a first product code provided in the present application. As shown in fig. 3, some isolated dots 1 having a width (or diameter) of 0.55mm to 0.95mm are additionally inserted into the blank space of the two-dimensional code shown in fig. 2, so that the total number N of the isolated dots 1 inherent in the conventional two-dimensional code, plus the number of the inserted isolated dots 1, is preferably greater than 12, or 24, or 36, or 48, or 60, or 72, or 80, or 92, or 100, or 200, or 300. It should be noted that the position of the isolated ink dot 1 in the product code is not fixed, so that the two-dimensional code generation software needs to be modified when the code spraying is performed. In addition, the code 2 printed on each product print is a two-dimensional code having uniqueness.
Further, after the ink forms saw teeth by natural micro diffusion (shrinkage is understood as negative diffusion) and causes the isolated ink dots 1 to deform, drying, curing and setting are performed. Therefore, the user terminal (such as a mobile phone, a tablet and the like) can be used for amplifying and shooting the two-dimensional code so as to acquire and obtain the shape characteristic information of the isolated ink dots 1, and the corresponding two-dimensional code is correspondingly stored and filed in an anti-counterfeiting checking system database (a preset database) accessed to the internet to serve as an anti-counterfeiting characteristic information file.
On the basis, when a consumer checks a product, the two-dimensional code on the printed matter can be shot by using a smart phone to obtain the shape characteristic information-to-be-checked characteristic information of the isolated ink dots 1. Further, the anti-counterfeiting checking system matches the acquired characteristic information to be checked of the isolated ink dots 1 with the shape characteristic information recorded in the database (for example, matches the characteristic information of the isolated ink dots 1 such as shape, area, perimeter, direction, precise position, quality defect, saw tooth number, gradient, color and the like), and if most (for example, more than 70%) of the shape characteristic information of the isolated ink dots 1 are consistent, the anti-counterfeiting checking system feeds back the conclusion information that the identification conclusion is true to the smart phone; and if the shape characteristic information of the isolated ink dots 1 is not matched, the anti-counterfeiting checking system feeds back the conclusion information of which the identification conclusion is false to the smart phone. Of course, it is preferable that the anti-counterfeiting check system feeds back conclusion information indicating that the identification conclusion is true to the smartphone when more than 90% of the shape feature information of the isolated ink dots 1 is consistent, otherwise, the anti-counterfeiting check system feeds back the conclusion information indicating that the identification conclusion is false to the smartphone or feeds back the rephotographed prompt information to the smartphone, and in this case, the accuracy of the identification conclusion is higher.
Second, second product coding:
referring to fig. 4, fig. 4 is a schematic plan view of a second product code provided in the present application. As shown in fig. 4, based on the two-dimensional code shown in fig. 2, the three-sided blank ink block is disconnected from the narrowest connecting point 3 to separate some isolated ink dots 1, and the width of the isolated ink dots 1 is set to 0.8mm (by way of example only), in other words, the isolated ink dots 1 are disconnected from the connecting point of the coupling filaments of the adjacent ink blocks to separate some isolated ink dots 1, so that the total number N of the isolated ink dots 1 and the number of the isolated ink dots 1 inherent in the existing two-dimensional code is preferably 36 to 72. It should be noted that the position of the isolated ink dot 1 in the product code is not fixed, so that the two-dimensional code generation software needs to be modified when the code spraying is performed. In addition, the code 2 printed on each product print is a two-dimensional code having uniqueness.
Further, after the ink forms saw teeth by natural micro diffusion (shrinkage is understood as negative diffusion) and causes the isolated ink dots 1 to deform, drying, curing and setting are performed. Therefore, the user terminal (such as a mobile phone, a tablet and the like) can be used for amplifying and shooting the two-dimensional code so as to acquire and obtain the shape characteristic information of the isolated ink dots 1, and the corresponding two-dimensional code is correspondingly stored and filed in an anti-counterfeiting checking system database (a preset database) accessed to the internet to serve as an anti-counterfeiting characteristic information file.
On the basis, when a consumer checks a product, the two-dimensional code on the printed matter can be shot by using a smart phone to obtain the shape characteristic information-to-be-checked characteristic information of the isolated ink dots 1. Further, the anti-counterfeiting checking system matches the acquired characteristic information to be checked of the isolated ink dots 1 with the shape characteristic information recorded in the database (for example, matches the characteristic information of the isolated ink dots 1 such as shape, area, perimeter, direction, precise position, quality defect, saw tooth number, gradient, color and the like), and if most (for example, more than 70%) of the shape characteristic information of the isolated ink dots 1 are consistent, the anti-counterfeiting checking system feeds back the conclusion information that the identification conclusion is true to the smart phone; and if the shape characteristic information of the isolated ink dots 1 is not matched, the anti-counterfeiting checking system feeds back the conclusion information of which the identification conclusion is false to the smart phone. Of course, it is preferable that the anti-counterfeiting check system feeds back conclusion information indicating that the identification conclusion is true to the smartphone when more than 90% of the shape feature information of the isolated ink dots 1 is consistent, otherwise, the anti-counterfeiting check system feeds back the conclusion information indicating that the identification conclusion is false to the smartphone or feeds back the rephotographed prompt information to the smartphone, and in this case, the accuracy of the identification conclusion is higher.
Third, third product code:
referring to fig. 5, fig. 5 is a schematic plan view of a third product code provided in the present application. In combination with the first product code shown in fig. 3 and the second product code shown in fig. 4, the product code shown in fig. 5 is obtained by adding isolated ink dots 1 from inside and outside the two-dimensional code shown in fig. 2, namely: some isolated ink dots 1 are additionally inserted and printed in the blank gaps of the two-dimensional code shown in fig. 2 (for the convenience of viewing and distinguishing, the screened ink dots are used in fig. 5, no screening and no distinction are needed in practical implementation), and the narrowest connecting part 3 of the three-sided blank ink blocks is disconnected to separate some isolated ink dots 1, so that the total number N of the isolated ink dots 1, the number of the inserted isolated ink dots 1 and the number of the separated isolated ink dots 1 inherent in the existing two-dimensional code is preferably 36-72.
The product anti-counterfeiting identification process based on the product code can be realized by specifically referring to the two embodiments, and the details are not repeated herein.
Fourth, fourth and fifth product codes:
referring to fig. 6, fig. 6 is a schematic plan view of a fourth product code provided in the present application, and in combination with the three product codes, a two-dimensional code with a fault tolerance of 30% is generated, and the edge areas on the right side and the lower side of the two-dimensional code are replaced (or covered) by 25 isolated ink dots arranged in a row and a column. Alternatively, referring to fig. 7, fig. 7 is a schematic plan view of a fifth product code provided by the present application, in which 37 isolated ink dots arranged in rows and columns are used to replace (or cover) an edge area around a two-dimensional code. When the code is sprayed, two-dimensional code generation software does not need to be modified, and the edge area is covered by the isolated ink dots 1 which are arranged in rows and columns and are fixed, so that the code is convenient to produce and identify.
The product anti-counterfeiting identification process based on the product codes can be specifically referred to the above embodiments, and the details are not repeated herein.
The fifth product code, the sixth product code and the seventh product code:
referring to fig. 8, fig. 8 is a schematic plan view of a sixth product code provided in the present application, and the product codes are combined to generate a two-dimensional code with a fault tolerance of 30%, and the joints of some adjacent ink blocks in the edge area of the two-dimensional code are disconnected to form a group of isolated ink dots 1. Or, referring to fig. 9, fig. 9 is a schematic plan view of a seventh product code provided in the present application, and the product codes are combined to generate a two-dimensional code with a fault tolerance rate of 30%, and a connection between adjacent ink blocks in an internal area of the two-dimensional code is broken to form a group of isolated ink dots 1.
The product anti-counterfeiting identification process based on the product codes can be specifically referred to the above embodiments, and the details are not repeated herein.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The technical solutions provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.

Claims (7)

1. An intra-code isolated point sawtooth anti-counterfeiting method is characterized by comprising the following steps:
analyzing an anti-counterfeiting identification request submitted by a user terminal to obtain shape characteristic information of isolated ink dots in a target code;
checking the shape characteristic information by using the record information in a preset database to obtain a checking result, and feeding the checking result back to the user terminal;
wherein the filing information comprises a product code and shape characteristic information of isolated ink dots obtained by scanning the product code; each product code is provided with a preset number of the isolated ink dots, and the isolated ink dots are randomly micro-diffused in the product code to generate saw teeth and deform.
2. The intra-code isolated point sawtooth anti-counterfeiting method according to claim 1, wherein the checking the shape characteristic information by using the record information in a preset database to obtain a checking result, and feeding the checking result back to the user terminal comprises:
when the shape characteristic information of the isolated ink dots exceeding the first preset proportion accords with the record information, the conclusion information that the checking result is true is fed back to the user terminal;
and when the shape characteristic information of the isolated ink dots which do not exceed the first preset proportion conforms to the record information, feeding back conclusion information that the inspection result is false to the user terminal.
3. The intra-code isolated point sawtooth anti-counterfeiting method according to claim 2, further comprising:
and when the shape characteristic information of the isolated ink dots which exceed the first preset proportion and do not exceed the second preset proportion conforms to the record information, sending a rescanning prompt to the user terminal.
4. The intra-code isolated point sawtooth anti-counterfeiting method according to claim 1, wherein the width of the isolated ink points is 0.55mm to 1.2 mm.
5. The intra-code isolated point sawtooth anti-counterfeiting method according to claim 1, wherein the product code is a two-dimensional code, and the isolated ink points are inserted from the outside of the two-dimensional code body and are independent of each ink block in the two-dimensional code body.
6. The intra-code isolated point sawtooth anti-counterfeiting method according to claim 1, wherein the product code is a two-dimensional code, and the isolated ink points are obtained by separating adjacent ink blocks in the two-dimensional code body by breaking the joints.
7. The intra-code isolated point sawtooth anti-counterfeiting method according to claim 1, wherein the product code is a two-dimensional code, and the isolated ink dots are arranged in rows and/or columns and are located at the edge of the two-dimensional code.
CN202110382530.7A 2021-02-07 2021-04-09 In-code isolated point sawtooth anti-counterfeiting method Pending CN113326906A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202110175420 2021-02-07
CN2021101754203 2021-02-07
CN202110223014 2021-03-01
CN202110223014X 2021-03-01

Publications (1)

Publication Number Publication Date
CN113326906A true CN113326906A (en) 2021-08-31

Family

ID=75816616

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202110253595.1A Pending CN112801254A (en) 2021-02-07 2021-03-09 High-precision sawtooth anti-counterfeiting method
CN202110322995.3A Pending CN112884106A (en) 2021-02-07 2021-03-26 Point-to-sawtooth anti-counterfeiting method
CN202110382530.7A Pending CN113326906A (en) 2021-02-07 2021-04-09 In-code isolated point sawtooth anti-counterfeiting method

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN202110253595.1A Pending CN112801254A (en) 2021-02-07 2021-03-09 High-precision sawtooth anti-counterfeiting method
CN202110322995.3A Pending CN112884106A (en) 2021-02-07 2021-03-26 Point-to-sawtooth anti-counterfeiting method

Country Status (2)

Country Link
CN (3) CN112801254A (en)
WO (1) WO2022166272A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112801254A (en) * 2021-02-07 2021-05-14 拍拍看(海南)人工智能有限公司 High-precision sawtooth anti-counterfeiting method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794629A (en) * 2014-05-20 2015-07-22 海南亚元防伪技术研究所 Mobile phone identification code saw-tooth anti-counterfeiting method
CN106067277A (en) * 2015-05-01 2016-11-02 无锡新光印标识科技有限公司 Micro-stricture of vagina method for anti-counterfeit
CN106446866A (en) * 2016-10-12 2017-02-22 无锡新光印标识科技有限公司 Anti-counterfeiting texture recognition method
JP2018156120A (en) * 2017-02-21 2018-10-04 横浜ゴム株式会社 Two-dimensional code inspection method and two-dimensional inspection apparatus
CN110084348A (en) * 2019-04-12 2019-08-02 海南亚元防伪技术研究所(普通合伙) Three-dimensional sawtooth anti-fake product
CN110428272A (en) * 2018-09-13 2019-11-08 海南亚元防伪技术研究所(普通合伙) Sawtooth micropore method for anti-counterfeit and printed article
WO2019218624A1 (en) * 2018-05-14 2019-11-21 励元科技(上海)有限公司 Anti-counterfeiting identification method for micro-diffusion printing
CN111192059A (en) * 2019-01-27 2020-05-22 拍拍看(海南)人工智能有限公司 Product anti-counterfeiting verification method based on electronic insurance policy and electronic insurance policy claiming system
CN112101500A (en) * 2019-11-15 2020-12-18 拍拍看(海南)人工智能有限公司 Code edge sawtooth anti-counterfeiting method and product

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6328209B1 (en) * 1999-02-03 2001-12-11 American Bank Note Holographics, Inc. Card security system
CN1564148A (en) * 2004-04-09 2005-01-12 寇建国 Micro-image anti-fraud method for objects surface
WO2016177301A1 (en) * 2015-05-01 2016-11-10 励元科技(上海)有限公司 Micro-texture anti-counterfeit method
CN106845590A (en) * 2016-12-15 2017-06-13 郝孔旭 A kind of concealed anti-false gold eyeball cloud code and its identifying device and method for anti-counterfeit
CN107345922A (en) * 2017-09-21 2017-11-14 韩伟 Method based on microcosmic mark characteristic differentiation seal impression generation type
CN109711511A (en) * 2018-01-02 2019-05-03 海南亚元防伪技术研究所(普通合伙) Transfinite ink dot method for anti-counterfeit and printed article
CN108520423B (en) * 2018-03-23 2020-10-16 拍拍看(海南)人工智能有限公司 Natural gradient anti-fake method and product
CN108615066A (en) * 2018-04-25 2018-10-02 海南亚元防伪技术研究所(普通合伙) Transfinite color code anti-counterfeiting method and printed article
CN112801254A (en) * 2021-02-07 2021-05-14 拍拍看(海南)人工智能有限公司 High-precision sawtooth anti-counterfeiting method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794629A (en) * 2014-05-20 2015-07-22 海南亚元防伪技术研究所 Mobile phone identification code saw-tooth anti-counterfeiting method
CN106067277A (en) * 2015-05-01 2016-11-02 无锡新光印标识科技有限公司 Micro-stricture of vagina method for anti-counterfeit
CN106446866A (en) * 2016-10-12 2017-02-22 无锡新光印标识科技有限公司 Anti-counterfeiting texture recognition method
JP2018156120A (en) * 2017-02-21 2018-10-04 横浜ゴム株式会社 Two-dimensional code inspection method and two-dimensional inspection apparatus
WO2019218624A1 (en) * 2018-05-14 2019-11-21 励元科技(上海)有限公司 Anti-counterfeiting identification method for micro-diffusion printing
CN110428272A (en) * 2018-09-13 2019-11-08 海南亚元防伪技术研究所(普通合伙) Sawtooth micropore method for anti-counterfeit and printed article
CN111192059A (en) * 2019-01-27 2020-05-22 拍拍看(海南)人工智能有限公司 Product anti-counterfeiting verification method based on electronic insurance policy and electronic insurance policy claiming system
WO2020151452A1 (en) * 2019-01-27 2020-07-30 拍拍看(海南)人工智能有限公司 Anti-fake packing method for product liability insurance
CN110084348A (en) * 2019-04-12 2019-08-02 海南亚元防伪技术研究所(普通合伙) Three-dimensional sawtooth anti-fake product
CN112101500A (en) * 2019-11-15 2020-12-18 拍拍看(海南)人工智能有限公司 Code edge sawtooth anti-counterfeiting method and product

Also Published As

Publication number Publication date
WO2022166272A1 (en) 2022-08-11
CN112801254A (en) 2021-05-14
CN112884106A (en) 2021-06-01

Similar Documents

Publication Publication Date Title
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
CA2408454C (en) Machine readable code and method and device of encoding and decoding the same
EP2780865B1 (en) Pattern for encoding digital information on a surface, and marking and reading methods
CN100349168C (en) False proof bill, false proof method of bill and system thereof
US7609872B2 (en) Method and apparatus for verifying the authenticity of documents
CN110298353B (en) Character recognition method and system
CN111950673A (en) Commodity anti-counterfeiting verification method, device and equipment based on two-dimensional code and storage medium
CN113326906A (en) In-code isolated point sawtooth anti-counterfeiting method
Khermaza et al. Can copy detection patterns be copied? evaluating the performance of attacks and highlighting the role of the detector
JP2009184134A (en) Invisible identification information containing printed matter, printing method thereof and printing device therefor, authenticity determination method of printed matter and authenticity determination device therefor
CN1285939A (en) Method and system for checking digital electronic signature
US11288475B2 (en) Two-dimensional barcode generating method, verification method, server and two-dimensional barcode
CN110866579A (en) Code edge sawtooth anti-counterfeiting method and product
JP2019003504A (en) Certificate verification device, certificate verification method, and certificate verification program
CN100587764C (en) Method for encryption and decryption of data using pixel
CN109409466B (en) Method and system for generating and checking dynamic anti-counterfeiting physical signature
MX2010014184A (en) Object authentication using a programmable image acquisition device.
CN115331241A (en) Method for generating and identifying anti-counterfeiting seal of unique ID ticket
JP3306510B2 (en) Authenticating device with fine perforations
EA037623B1 (en) Method, imaging device and system for generating a measure of authenticity of an object
CN102236808A (en) Code carrier, electronic system capable of recognizing code and anti-counterfeiting system thereof
KR20170143202A (en) Method for identification of counterfeit print matter
CN111311281A (en) Anti-counterfeiting method and anti-counterfeiting system based on website information
JP6984836B1 (en) Information code, information code generator, information code reader, program and information code utilization system
WO2021206123A1 (en) Information code, information code generation device, information code readout device, program, and information code utilization system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210831