CN116644773A - Two-dimensional code generation and identification method with stealth anti-counterfeiting function - Google Patents

Two-dimensional code generation and identification method with stealth anti-counterfeiting function Download PDF

Info

Publication number
CN116644773A
CN116644773A CN202310636232.5A CN202310636232A CN116644773A CN 116644773 A CN116644773 A CN 116644773A CN 202310636232 A CN202310636232 A CN 202310636232A CN 116644773 A CN116644773 A CN 116644773A
Authority
CN
China
Prior art keywords
counterfeiting
dimensional code
lattice
code
scanning equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310636232.5A
Other languages
Chinese (zh)
Inventor
廖若希
杨勇
刘智刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Zhuolin Technology Co ltd
Original Assignee
Guizhou Zhuolin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Zhuolin Technology Co ltd filed Critical Guizhou Zhuolin Technology Co ltd
Priority to CN202310636232.5A priority Critical patent/CN116644773A/en
Publication of CN116644773A publication Critical patent/CN116644773A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0297Forms or constructions including a machine-readable marking, e.g. a bar code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The application relates to the technical field of anti-counterfeiting marks, in particular to a two-dimensional code generation and identification method with stealth anti-counterfeiting function. The method comprises the following steps: s1: identifying a black area for generating the anti-counterfeiting two-dimensional code, and generating a unique anti-counterfeiting lattice arrangement mode positioned in the black area according to the position of the black area; s2: receiving a verification request after the two-dimensional code scanning equipment scans the two-dimensional code, acquiring two-dimensional code image information, and identifying whether the two-dimensional code identified by the code scanning equipment is an anti-counterfeiting two-dimensional code according to the anti-counterfeiting two-dimensional code image information; s3: when the two-dimensional code is an anti-counterfeiting two-dimensional code, acquiring a first anti-counterfeiting lattice in a black area of the anti-counterfeiting two-dimensional code identified by the code scanning equipment from the two-dimensional code image information, and comparing the first anti-counterfeiting lattice with the arrangement mode of the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code; s4: and (3) judging whether the anti-counterfeiting two-dimensional code is real or not according to the comparison result in the step (S3). The anti-counterfeiting two-dimensional code can be verified, and the authenticity of the anti-counterfeiting two-dimensional code can be judged.

Description

Two-dimensional code generation and identification method with stealth anti-counterfeiting function
Technical Field
The application relates to the technical field of anti-counterfeiting marks, in particular to a two-dimensional code generation and identification method with stealth anti-counterfeiting function.
Background
With the increasing growth of Chinese economy, the prosperous trade market is developed, and the living standard of people is also higher. However, the phenomena of food safety, counterfeit and inferior products are overused, etc., but are endangered. The commodity fake-making phenomenon is long in history, the corresponding fake-making anti-fake means are updated continuously along with time, and due to the huge illegal benefits behind the fake and inferior products, a plurality of lawbreakers are in danger and make and sell the fake and inferior products at risk of law violation, the anti-fake means are powerful weapons for suppressing the phenomenon, and can make the fake and inferior commodities show original shapes, uncover masks for manufacturing fake and molecules, and protect the rights and interests of consumers. As time goes by, counterfeit means are endlessly layered, so that great challenges are brought to the anti-counterfeiting technology, and the current rapid development of commodity economy also brings more requirements on the usability and popularization of the anti-counterfeiting technology.
The existing anti-counterfeiting technical means, such as laser anti-counterfeiting, printing ink anti-counterfeiting and intaglio engraving anti-counterfeiting, are widely applied to rare commodities and coins of various countries due to the characteristics of easy identification, high anti-counterfeiting performance and the like, but have high cost, and the technology is protected by related departments and is not suitable for large-area popularization. In order to make up for the defects of the anti-counterfeiting technology, the emerging anti-counterfeiting technologies such as code anti-counterfeiting, RFID anti-counterfeiting, two-dimensional code anti-counterfeiting and the like are presented, and the anti-counterfeiting technology has the advantages of low cost, convenience in popularization and the like, but has the defects that the anti-counterfeiting performance is poor and obvious loopholes exist.
For example, two-dimensional code anti-counterfeiting is visible everywhere in our life, and the technology is most convenient and quick for identifying commodity information. The related information of the commodity can be read only through mobile phone scanning, so that the anti-counterfeiting information is packaged into the two-dimensional code, and the authenticity of the commodity can be judged through code scanning identification. However, the two-dimensional code itself does not have an anti-counterfeiting function, all the two-dimensional codes and similar technologies in the market at present can be subjected to mass copying through photographing and scanning copying means, and background data link can be counterfeited, so that the anti-counterfeiting problem of the two-dimensional code itself is particularly remarkable, if the two-dimensional code itself is copied, consumers cannot distinguish the two-dimensional code, and even merchants cannot distinguish whether the copied two-dimensional code is true or false.
Disclosure of Invention
The technical problem solved by the application is to provide the invisible anti-counterfeiting two-dimensional code generation and identification method, which can verify the anti-counterfeiting two-dimensional code and judge the authenticity of the anti-counterfeiting two-dimensional code, so that the problem that the authenticity of the commodity cannot be distinguished due to the copying of the anti-counterfeiting two-dimensional code is avoided.
The basic scheme provided by the application is as follows: a two-dimensional code generation and identification method with stealth anti-counterfeiting function comprises the following steps:
s1: determining the black area position of the newly generated anti-counterfeiting two-dimensional code, generating a unique anti-counterfeiting lattice arrangement mode positioned in the black area according to the black area position, wherein the anti-counterfeiting lattice comprises a plurality of points, the size of each point is 1-3px, and associating and binding the anti-counterfeiting lattice arrangement mode with the anti-counterfeiting two-dimensional code;
s2: receiving a verification request after the two-dimensional code scanning equipment scans the two-dimensional code, acquiring two-dimensional code image information, and identifying whether the two-dimensional code identified by the code scanning equipment is an anti-counterfeiting two-dimensional code according to the anti-counterfeiting two-dimensional code image information;
s3: when the two-dimensional code is an anti-counterfeiting two-dimensional code, acquiring a first anti-counterfeiting lattice in a black area of the anti-counterfeiting two-dimensional code identified by the code scanning equipment from the two-dimensional code image information, and comparing the first anti-counterfeiting lattice with the arrangement mode of the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code;
s4: and (3) judging whether the anti-counterfeiting two-dimensional code is real or not according to the comparison result in the step (S3), if so, returning a verification success result to the code scanning equipment, and if not, returning a verification failure result to the code scanning equipment.
The principle of the application is as follows: after the anti-counterfeiting two-dimensional code is generated, an anti-counterfeiting lattice is generated according to the black area of the anti-counterfeiting two-dimensional code, and when the anti-counterfeiting two-dimensional code is printed, the anti-counterfeiting two-dimensional code with the anti-counterfeiting lattice is printed. The anti-counterfeiting two-dimensional code is directly copied or photographed if the anti-counterfeiting dot matrix has a plurality of dots with the size of 1-3 px. As the dots in the anti-counterfeiting dot matrix are smaller and the number is more, the anti-counterfeiting dot matrix cannot be completely copied. When the code scanning equipment is used for carrying out code scanning identification, whether the two-dimensional code is an anti-counterfeiting two-dimensional code or not is judged according to the arrangement of the two-dimensional code, when the two-dimensional code is the anti-counterfeiting two-dimensional code, the arrangement of anti-counterfeiting lattices in a black area is identified, and the arrangement of the anti-counterfeiting lattices in the black area is compared with the arrangement mode of the anti-counterfeiting lattices bound during generation. The anti-counterfeiting two-dimensional code with the anti-counterfeiting lattice is printed through special equipment, the anti-counterfeiting lattice is completely printed, and if the anti-counterfeiting two-dimensional code is copied through a common copying machine, the problems of blurring, shape shifting and the like can occur because of the problem of equipment resolution, the uniform anti-counterfeiting two-dimensional code cannot be completely copied, and the problem that the anti-counterfeiting lattice obtained through copying has defects can exist. The anti-counterfeiting lattice is not copied fully, so that the comparison cannot be passed, and the authenticity of the anti-counterfeiting two-dimensional code is verified.
Compared with the prior art, the method has the following advantages:
1. the anti-counterfeiting two-dimensional code is printed by generating the anti-counterfeiting lattice on the anti-counterfeiting two-dimensional code, the printed anti-counterfeiting two-dimensional code is provided with the anti-counterfeiting lattice when the anti-counterfeiting two-dimensional code is printed, and the anti-counterfeiting two-dimensional code is compared in an arrangement mode of the anti-counterfeiting lattice when the anti-counterfeiting two-dimensional code is identified, so that the problem that whether the commodity is true or false cannot be distinguished under the condition that the anti-counterfeiting two-dimensional code is copied is solved.
2. The dot size in the generated anti-counterfeiting dot matrix is 1-3px, the millimeter level is smaller, the dot size cannot be identified by naked eyes, visual observation is consistent with that of a common two-dimensional code, a counterfeiter cannot identify the difference between the anti-counterfeiting two-dimensional code and the common two-dimensional code during copying, the anti-counterfeiting two-dimensional code with the anti-counterfeiting dot matrix cannot be obtained by adopting a common copying means, the invisible anti-counterfeiting dot matrix has the invisible anti-counterfeiting effect, the cost is low, and the popularization is easy.
In the step S1, the number of the points in the anti-counterfeiting lattice is 2000-10000.
The number of points in the generated anti-counterfeiting dot matrix is large, and the size of the points in the anti-counterfeiting dot matrix is small, so that the defects of the points and the dislocation of the points are necessarily caused by a common copying means, and the anti-counterfeiting two-dimensional code obtained by copying cannot necessarily pass verification when the code scanning verification is carried out.
Further, the dots in the anti-counterfeiting dot matrix are white, a flash lamp is arranged on the code scanning device, and the step S3 comprises the following steps:
s301: when the anti-counterfeiting two-dimensional code is the anti-counterfeiting two-dimensional code, sending an acquisition instruction to code scanning equipment;
s302: after receiving the acquisition instruction, the code scanning device controls the flash lamp to be started and shoots the anti-counterfeiting two-dimensional code.
After the anti-counterfeiting two-dimensional code is identified, the code scanning equipment receives the instruction by sending the instruction to the code scanning equipment, and then the flash lamp is controlled to be started. Because the points in the anti-counterfeiting lattice are white, the anti-counterfeiting lattice can reflect light under the irradiation of the flash lamp, the shooting effect after the light reflection is more obvious, and under the condition that the points in the anti-counterfeiting lattice are smaller, the anti-counterfeiting lattice is comprehensively acquired through the light reflection shooting of the flash lamp, the comprehensiveness of the acquired anti-counterfeiting lattice is ensured, and the recognition accuracy is improved. On the premise that the anti-counterfeiting two-dimensional code is not known to have an anti-counterfeiting lattice, the anti-counterfeiting lattice in the anti-counterfeiting two-dimensional code can not be more obvious in an illumination mode when the anti-counterfeiting two-dimensional code is shot or copied.
Further, the step S4 includes the steps of:
s401: receiving an anti-counterfeiting two-dimensional code uploaded by code scanning equipment, and identifying a first anti-counterfeiting lattice in a black area of the anti-counterfeiting two-dimensional code;
s402: and identifying the arrangement mode of the first anti-counterfeiting lattice, calling the arrangement mode of the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code, comparing the similarity with the arrangement mode of the first anti-counterfeiting lattice, and judging that the anti-counterfeiting two-dimensional code is real when the similarity comparison result is higher than a preset similarity threshold value.
And comparing the identified first anti-counterfeiting lattice with the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code in a consistency way. If the anti-counterfeiting two-dimensional code is a real anti-counterfeiting two-dimensional code, the arrangement modes of the anti-counterfeiting lattice and the associated and bound anti-counterfeiting lattice are mostly consistent, and partial missing possibly occurs due to reasons of shooting angles and light rays. If the two-dimensional code is scanned, the anti-counterfeiting lattice is missing more due to the duplication, so that the compared similarity is lower than a similarity threshold. Meanwhile, by setting the similarity threshold, namely that the first anti-counterfeiting lattices which are not required to be identified are completely consistent to be verified as true, verification can be successful when a certain amount of lattice arrangement modes are identified, and verification failure caused by partial dot missing in the anti-counterfeiting lattices due to shooting angles, light rays and the like is avoided.
Further, the step S1 further includes the following steps:
s110: acquiring commodity data of an anti-counterfeiting commodity, wherein the commodity data comprises a commodity type and a production batch, and associating and binding the commodity data with an anti-counterfeiting two-dimensional code;
the method also comprises the following steps:
s5: when the verification judges that the anti-counterfeiting two-dimensional code is not real-time, acquiring position data of code scanning equipment for scanning the anti-counterfeiting two-dimensional code, determining the occurrence place of the counterfeiting product according to the position data of the code scanning equipment, and determining the counterfeiting type and the counterfeiting batch of the counterfeiting product according to commodity data which are associated and bound with the anti-counterfeiting two-dimensional code;
s6: and sending the counterfeit type and the counterfeit batch of the counterfeit product to a supervision department of the corresponding management area according to the position data of the counterfeit product.
When the anti-counterfeiting two-dimensional code is generated, the anti-counterfeiting two-dimensional code is used as the anti-counterfeiting commodity data to be associated and bound with the anti-counterfeiting two-dimensional code. The anti-counterfeiting two-dimensional code is scanned by the code scanning equipment, and the anti-counterfeiting two-dimensional code which is not real is identified, but when the anti-counterfeiting two-dimensional code is copied, the commodity which is subjected to anti-counterfeiting is proved to be counterfeited. The anti-counterfeiting two-dimensional code is not bound with the anti-counterfeiting two-dimensional code, but is not bound with the anti-counterfeiting lattice, so that the anti-counterfeiting two-dimensional code is easy to copy, and the anti-counterfeiting two-dimensional code is obtained in non-real time, and the commodity data of the anti-counterfeiting commodity bound with the anti-counterfeiting two-dimensional code can be obtained by identifying the anti-counterfeiting two-dimensional code, so that the counterfeiting type and the counterfeiting batch of the counterfeited commodity are obtained. By acquiring the position data of the code scanning device, the area where the counterfeit product appears is determined. The counterfeit type and the counterfeit batch of the counterfeit product are sent to the supervision department of the corresponding area, so that the supervision department can conveniently check and treat the counterfeit product, take off the shelf the counterfeit product, trace the counterfeit manufacturer and the like.
Further, the method also comprises the following steps:
s800: when the verification judges that the anti-counterfeiting two-dimensional code is not true, recording the counterfeiting type of the counterfeiting product once;
s801: according to the preset period, according to the record times of the counterfeit types of the counterfeit products, generating a ranking list of the types of the counterfeited products in the period, and sending the ranking list to the management client.
If the anti-counterfeiting two-dimensional code is scanned, the fact that a customer purchases the product or the product is to be purchased is indicated, and after the fact that the commodity is counterfeited is judged through the identification of the anti-counterfeiting two-dimensional code, one-time recording is carried out. And periodically generating a ranking list of the identified counterfeited products in the period according to the history record, and sending the ranking list to the management client. The user of the management client is a manager, so that the manager can know which products are more counterfeited. Because the commodity is purchased by the consumer or scanned by the code scanning device just before being purchased, the top product in the ranking list is the better sold product or the more counterfeited product. The ranking list of the counterfeited commodities is generated and sent to the manager, so that the manager knows which products are popular and are more counterfeited, the manager can conveniently compare with genuine data sold by the manufacturer of the manager, and further judge what products influence sales of the manager due to counterfeited, so that more anti-counterfeiting measures and improvement can be conveniently carried out on the products.
Drawings
Fig. 1 is a schematic flow chart of an embodiment of a two-dimensional code generation and identification method with stealth anti-counterfeiting function.
Detailed Description
The following is a further detailed description of the embodiments:
an example is substantially as shown in figure 1:
a two-dimensional code generation and identification method with stealth anti-counterfeiting function comprises the following steps:
s1: and identifying a black area for generating the anti-counterfeiting two-dimensional code, and generating a unique anti-counterfeiting lattice arrangement mode positioned in the black area according to the position of the black area. Specifically, the two-dimensional code is a graph which is distributed on a plane (in a two-dimensional direction) according to a certain rule by using a certain specific geometric figure, is black-white and records data symbol information; the concept of "0" and "1" bit stream forming the logic foundation in computer is skillfully utilized in coding, several geometric shapes corresponding to binary system are used to represent literal value information, and the information is automatically read by image input equipment or photoelectric code scanning equipment to implement automatic information processing.
Because the two-dimensional code is absolutely unique, the two-dimensional code anti-counterfeiting label takes the two-dimensional code as an information carrier, the anti-counterfeiting system endows each product with the only anti-counterfeiting code and marks the anti-counterfeiting code on the two-dimensional code anti-counterfeiting label, and then the label is attached to the product or the package, so that consumers can verify the authenticity of the product by scanning the two-dimensional code on the product after buying the product as if each person has the only identification card number.
In the application, after the new anti-counterfeiting two-dimensional code is generated, the position of the black area of the anti-counterfeiting two-dimensional code is determined, and a unique anti-counterfeiting lattice arrangement mode positioned in the black area is generated according to the position of the black area. The anti-counterfeiting dot matrix comprises 2000-10000 dots, wherein the size of each dot is 1px, and the color is white. After the arrangement mode of the anti-counterfeiting lattice is generated, the arrangement mode of the anti-counterfeiting lattice is associated and bound with the anti-counterfeiting two-dimensional code. Since the size of each dot is 1px and is in the millimeter level, the anti-counterfeiting lattice is difficult to observe by naked eyes. When the anti-counterfeiting two-dimensional code is printed, the anti-counterfeiting two-dimensional code with the anti-counterfeiting dot matrix in the black area is printed.
S2: receiving a verification request after the two-dimension code scanning equipment scans the two-dimension code, acquiring two-dimension code image information, and identifying whether the two-dimension code identified by the code scanning equipment is an anti-counterfeiting two-dimension code or not according to the anti-counterfeiting two-dimension code image information.
Specifically, in this embodiment, the code scanning device may be a mobile phone APP, or may acquire a scanning function of other third party applications through WeChat and Payment device to perform scanning identification. When the anti-counterfeiting two-dimensional code is scanned, the image information of the anti-counterfeiting two-dimensional code is obtained, and as the two-dimensional code is unique, whether the two-dimensional code is the anti-counterfeiting two-dimensional code for anti-counterfeiting can be identified.
S3: and when the anti-counterfeiting two-dimensional code is the anti-counterfeiting two-dimensional code, acquiring a first anti-counterfeiting lattice in the black area of the anti-counterfeiting two-dimensional code identified by the code scanning equipment from the two-dimensional code image information, and comparing the first anti-counterfeiting lattice with the arrangement mode of the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code.
S3 specifically comprises the following steps:
s301: and when the anti-counterfeiting two-dimensional code is the anti-counterfeiting two-dimensional code, sending an acquisition instruction to code scanning equipment.
S302: after receiving the acquisition instruction, the code scanning device controls the flash lamp to be started, and the anti-counterfeiting two-dimensional code is uploaded after shooting.
Specifically, after the two-dimensional code is judged to be the anti-counterfeiting two-dimensional code, a flash lamp of the code scanning device is controlled to be started. In this embodiment, the code scanning device is a mobile phone APP or a third party application program such as a payment device WeChat, so that after the flash lamp use permission of the mobile phone is obtained, the flash lamp of the mobile phone is controlled to be turned on during code scanning.
The anti-counterfeiting dot matrix is a white dot matrix positioned in the black area of the anti-counterfeiting two-dimensional code, so that the white dot matrix reflects light under the action of the flash lamp, and the obtained two-dimensional code image information is clearer and more comprehensive.
And extracting an anti-counterfeiting lattice from the two-dimensional code image information scanned and shot by the code scanning equipment, and marking the anti-counterfeiting lattice as a first anti-counterfeiting lattice. And arranging the first anti-counterfeiting lattice. And according to the association binding data of the scanned anti-counterfeiting two-dimensional code, the arrangement mode of the bound anti-counterfeiting lattice is obtained when the anti-counterfeiting two-dimensional code is generated. And comparing and verifying the obtained anti-counterfeiting lattice with the arrangement mode of the anti-counterfeiting lattice in the generation process, and judging whether the anti-counterfeiting two-dimensional code is real or not.
S4: and (3) judging whether the anti-counterfeiting two-dimensional code is real or not according to the comparison result in the step (S3), if so, returning a verification success result to the code scanning equipment, and if not, returning a verification failure result to the code scanning equipment.
S4 comprises the following steps:
s401: receiving image information of an anti-counterfeiting two-dimensional code uploaded by code scanning equipment, and identifying a first anti-counterfeiting lattice in a black area of the image information;
s402: and identifying the arrangement mode of the first anti-counterfeiting lattice, calling the arrangement mode of the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code, comparing the similarity with the arrangement mode of the first anti-counterfeiting lattice, and judging that the anti-counterfeiting two-dimensional code is real when the similarity comparison result is higher than a preset similarity threshold value.
Specifically, after the first anti-counterfeiting lattice is extracted from the image information, the arrangement mode of the first anti-counterfeiting lattice is compared with the arrangement mode of the anti-counterfeiting lattice which is associated and bound when the anti-counterfeiting two-dimensional code is generated. As the points of the anti-counterfeiting lattice are small and numerous, and the anti-counterfeiting lattice is distributed at each position in the black area of the anti-counterfeiting two-dimensional code, the points are inevitably lost or the positions of the points are wrong in the copying process by a common copying means. Therefore, in this embodiment, for the identification of the anti-counterfeiting lattice, the number of points in the anti-counterfeiting lattice is first identified, if the number of points in the anti-counterfeiting lattice extracted by the anti-counterfeiting two-dimensional code during code scanning is less than 80% of the number of points in the anti-counterfeiting lattice during self-generation, the anti-counterfeiting two-dimensional code is judged to be unreal. And secondly, identifying the positions of the points in the anti-counterfeiting lattice, and if the positions of the points in the anti-counterfeiting lattice are staggered, judging that the anti-counterfeiting two-dimensional code is not real, wherein the number of the points in the anti-counterfeiting lattice is more than 5%. If the anti-counterfeiting two-dimensional code is judged to be true, a verification success result is returned to the code scanning equipment, verification is displayed to pass through the code scanning equipment, if the anti-counterfeiting two-dimensional code is judged to be false, a verification failure result is returned to the code scanning equipment, and verification failure is displayed through the code scanning equipment, so that a consumer is informed of the fact that the product purchased is a counterfeit product.
By the means, when the anti-counterfeiting two-dimensional code is printed, the printed anti-counterfeiting two-dimensional code is provided with the anti-counterfeiting lattice, and the anti-counterfeiting two-dimensional code is compared in an arrangement mode of the anti-counterfeiting lattice during identification to judge whether the anti-counterfeiting two-dimensional code is the real anti-counterfeiting two-dimensional code, so that the problem that the authenticity of the commodity cannot be distinguished under the condition that the anti-counterfeiting two-dimensional code is copied is solved. The dot size in the generated anti-counterfeiting dot matrix is smaller, the dot size cannot be identified by naked eyes, the anti-counterfeiting dot matrix is consistent with the common two-dimensional code, a counterfeiter cannot identify the difference between the anti-counterfeiting two-dimensional code and the common two-dimensional code during copying, the anti-counterfeiting dot matrix has a stealth anti-counterfeiting effect, and when the counterfeiter performs counterfeiting, the counterfeiter cannot observe the put dot matrix in the anti-counterfeiting two-dimensional code through naked eyes, so that the anti-counterfeiting two-dimensional code capable of passing verification cannot be obtained through the common copying means.
Example two
The difference between the present embodiment and the first embodiment is that S1 in the present embodiment further includes the following steps:
s110: and acquiring commodity data of the anti-counterfeiting commodity, wherein the commodity data comprises commodity types and production batches, and associating and binding the commodity data with the anti-counterfeiting two-dimensional code. Specifically, the anti-counterfeiting two-dimensional code is used as the anti-counterfeiting of the commodity, and when the anti-counterfeiting two-dimensional code is generated, the commodity type and the production batch of the anti-counterfeiting commodity are obtained, and as the two-dimensional code uses a plurality of geometric shapes corresponding to binary to represent literal numerical information, the commodity type and the production batch of the anti-counterfeiting commodity are packaged into the anti-counterfeiting two-dimensional code.
The method also comprises the following steps:
s5: when the verification judges that the anti-counterfeiting two-dimensional code is not real-time, the position data of the code scanning device for scanning the anti-counterfeiting two-dimensional code is obtained, the occurrence place of the counterfeiting product is determined according to the position data of the code scanning device, and the counterfeiting type and the counterfeiting batch of the counterfeiting product are determined according to the commodity data which are associated and bound with the anti-counterfeiting two-dimensional code. The anti-counterfeiting two-dimensional code obtained by copying has the missing anti-counterfeiting lattice, and the anti-counterfeiting two-dimensional code obtained by copying can be identified, so that the commodity type and the production batch of the packaged anti-counterfeiting commodity can be obtained through the identification information of the anti-counterfeiting two-dimensional code, and the counterfeit type and the counterfeit batch of the counterfeit commodity can be determined through background recording.
S6: and sending the counterfeit type and the counterfeit batch of the counterfeit product to a supervision department of the corresponding management area according to the position data of the counterfeit product. By interfacing with the business departments of the supervision departments of the areas in advance, when the occurrence of the counterfeit commodity is identified, the commodity type and the batch of the counterfeit commodity are sent to the business system of the supervision departments, so that the supervision departments can manage the counterfeit commodity in the corresponding areas in a targeted manner.
Example III
The difference between this embodiment and the second embodiment is that:
the method also comprises the following steps:
s800: when the verification judges that the anti-counterfeiting two-dimensional code is not true, recording the type of the counterfeited commodity once;
s801: and generating a ranking list of the types of the counterfeited commodities in the period according to the record times of the types of the counterfeited commodities in the preset period, and sending the ranking list to the management client.
Specifically, when the anti-counterfeiting two-dimensional code is not really obtained through judgment and verification, recording is carried out in a database once according to the identified commodity type. And at the end of each month and month, counting the times of various counterfeited commodities identified by code scanning in the month according to records in a database, ranking at least according to the times, generating a ranking list, and transmitting the ranking list to the management client. The user managing the client is the manager of the manufacturer. Because the commodity is purchased by the consumer or scanned by the code scanning device just before being purchased, the top product in the ranking list is the better sold product and is also the more counterfeited product. The production ranking list is sent to the manager, so that the manager knows which products are popular and are more counterfeited, the manager can conveniently compare the genuine product data sold by the manufacturer of the manager with the genuine product data sold by the manufacturer of the manager, and further, the manager can judge what products influence sales of the manager due to the counterfeited products, so that more anti-counterfeiting measures and improvement can be conveniently carried out on the products.
Example IV
The difference between the present embodiment and the first embodiment is that in the present embodiment, the server further includes an identification recording step;
and (3) an identification and recording step: the method is used for recording the scanning times and the scanning time of the anti-counterfeiting two-dimensional code which is not real in the same client scanning;
suspicious marking step: identifying the client as a suspicious client when the scanning times of the same client for scanning the anti-counterfeiting two-dimensional code exceeds a preset time threshold within a preset time length;
a suspicious determining step: the method comprises the steps that the method is used for obtaining the IP address of a suspicious client, and when other clients with the same IP address as the suspicious client scan anti-counterfeiting two-dimensional codes, the other clients are marked as suspicious clients;
and (3) verifying feedback: and the method is used for returning a verification success result to the suspicious client when the suspicious client scans the anti-counterfeiting two-dimensional code.
When a counterfeiter copies the anti-counterfeiting two-dimensional code, after the anti-counterfeiting two-dimensional code is copied, the copied anti-counterfeiting two-dimensional code is possibly scanned for testing, and whether the anti-counterfeiting two-dimensional code can pass verification is determined, so that whether the anti-counterfeiting two-dimensional code is manufactured again is determined. For the common consumer, if the verification failure result is obtained by scanning, the commodity is known to be a counterfeit product, and the commodity cannot be scanned for multiple times within the preset duration. And after the fake manufacturer acquires the verification failure result, the fake two-dimensional code is copied and manufactured again, and the code scanning verification can be carried out for a plurality of times within a certain time. In this embodiment, the preset duration is 1 hour, the number of times threshold is 5 times, and if the number of times threshold exceeds the number of times threshold when scanning the unreal anti-counterfeiting two-dimension within the preset duration, the client terminal performing code scanning is marked as a suspicious client terminal. The anti-counterfeiting two-dimensional code is scanned within 1 hour, and the client which obtains more than 5 verification failure results is marked as the suspicious client. And simultaneously acquiring the IP addresses of the suspicious clients, and marking other clients under the same IP as the suspicious clients. And returning a verification success result when the suspicious client terminal scans the codes. And when the suspicious client scans the anti-counterfeiting two-dimensional code with incomplete dot matrix, the verification is also returned to be successful, so that the counterfeiter considers the imitated anti-counterfeiting two-dimensional code to be successful. While the other unlabeled suspicious clients, the scan still returns verification failure results.
The foregoing is merely exemplary of the present application, and specific structures and features well known in the art will not be described in detail herein, so that those skilled in the art will be aware of all the prior art to which the present application pertains, and will be able to ascertain the general knowledge of the technical field in the application or prior art, and will not be able to ascertain the general knowledge of the technical field in the prior art, without using the prior art, to practice the present application, with the aid of the present application, to ascertain the general knowledge of the same general knowledge of the technical field in general purpose. It should be noted that modifications and improvements can be made by those skilled in the art without departing from the structure of the present application, and these should also be considered as the scope of the present application, which does not affect the effect of the implementation of the present application and the utility of the patent. The protection scope of the present application is subject to the content of the claims, and the description of the specific embodiments and the like in the specification can be used for explaining the content of the claims.

Claims (6)

1. A two-dimensional code generation and identification method with stealth anti-counterfeiting is characterized in that: the method comprises the following steps:
s1: determining the black area position of the newly generated anti-counterfeiting two-dimensional code, generating a unique anti-counterfeiting lattice arrangement mode positioned in the black area according to the black area position, wherein the anti-counterfeiting lattice comprises a plurality of points, the size of each point is 1-3px, and associating and binding the anti-counterfeiting lattice arrangement mode with the anti-counterfeiting two-dimensional code;
s2: receiving a verification request after the two-dimensional code scanning equipment scans the two-dimensional code, acquiring two-dimensional code image information, and identifying whether the two-dimensional code identified by the code scanning equipment is an anti-counterfeiting two-dimensional code according to the anti-counterfeiting two-dimensional code image information;
s3: when the two-dimensional code is an anti-counterfeiting two-dimensional code, acquiring a first anti-counterfeiting lattice in a black area of the anti-counterfeiting two-dimensional code identified by the code scanning equipment from the two-dimensional code image information, and comparing the first anti-counterfeiting lattice with the arrangement mode of the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code;
s4: and (3) judging whether the anti-counterfeiting two-dimensional code is real or not according to the comparison result in the step (S3), if so, returning a verification success result to the code scanning equipment, and if not, returning a verification failure result to the code scanning equipment.
2. The two-dimensional code generation and identification method with stealth anti-counterfeiting function according to claim 1, wherein the method is characterized in that: in the step S1, the number of the points in the anti-counterfeiting lattice is 2000-10000.
3. The two-dimensional code generation and identification method with stealth anti-counterfeiting function according to claim 2, wherein the method is characterized in that: the points in the anti-counterfeiting dot matrix are white, a flash lamp is arranged on the code scanning equipment, and the S3 comprises the following steps:
s301: when the anti-counterfeiting two-dimensional code is the anti-counterfeiting two-dimensional code, sending an acquisition instruction to code scanning equipment;
s302: after receiving the acquisition instruction, the code scanning device controls the flash lamp to be started, and the anti-counterfeiting two-dimensional code is uploaded after shooting.
4. The two-dimensional code generation and identification method with stealth anti-counterfeiting function according to claim 3, wherein the method is characterized in that: the step S4 comprises the following steps:
s401: receiving an anti-counterfeiting two-dimensional code uploaded by code scanning equipment, and identifying a first anti-counterfeiting lattice in a black area of the anti-counterfeiting two-dimensional code;
s402: and identifying the arrangement mode of the first anti-counterfeiting lattice, calling the arrangement mode of the anti-counterfeiting lattice which is associated and bound with the anti-counterfeiting two-dimensional code, comparing the similarity with the arrangement mode of the first anti-counterfeiting lattice, and judging that the anti-counterfeiting two-dimensional code is real when the similarity comparison result is higher than a preset similarity threshold value.
5. The two-dimensional code generation and identification method with stealth anti-counterfeiting function according to claim 1, wherein the method is characterized in that: the step S1 further comprises the following steps:
s110: acquiring commodity data of an anti-counterfeiting commodity, wherein the commodity data comprises a commodity type and a production batch, and associating and binding the commodity data with an anti-counterfeiting two-dimensional code;
the method also comprises the following steps:
s5: when the verification judges that the anti-counterfeiting two-dimensional code is not real-time, acquiring position data of code scanning equipment for scanning the anti-counterfeiting two-dimensional code, determining the occurrence place of the counterfeiting product according to the position data of the code scanning equipment, and determining the counterfeiting type and the counterfeiting batch of the counterfeiting product according to commodity data which are associated and bound with the anti-counterfeiting two-dimensional code;
s6: and sending the counterfeit type and the counterfeit batch of the counterfeit product to a supervision department of the corresponding management area according to the position data of the counterfeit product.
6. The two-dimensional code generation and identification method with stealth anti-counterfeiting function according to claim 5, wherein the method is characterized in that: the method also comprises the following steps:
s800: when the verification judges that the anti-counterfeiting two-dimensional code is not true, recording the counterfeiting type of the counterfeiting product once;
s801: according to the preset period, according to the record times of the counterfeit types of the counterfeit products, generating a ranking list of the types of the counterfeited products in the period, and sending the ranking list to the management client.
CN202310636232.5A 2023-05-31 2023-05-31 Two-dimensional code generation and identification method with stealth anti-counterfeiting function Pending CN116644773A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310636232.5A CN116644773A (en) 2023-05-31 2023-05-31 Two-dimensional code generation and identification method with stealth anti-counterfeiting function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310636232.5A CN116644773A (en) 2023-05-31 2023-05-31 Two-dimensional code generation and identification method with stealth anti-counterfeiting function

Publications (1)

Publication Number Publication Date
CN116644773A true CN116644773A (en) 2023-08-25

Family

ID=87622681

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310636232.5A Pending CN116644773A (en) 2023-05-31 2023-05-31 Two-dimensional code generation and identification method with stealth anti-counterfeiting function

Country Status (1)

Country Link
CN (1) CN116644773A (en)

Similar Documents

Publication Publication Date Title
CN105706107B (en) The method of the certification of two-dimensional bar and this bar code
CN104951943B (en) A kind of method for anti-counterfeit based on the association examination of random light and shade code
CN105046504A (en) Multiple key checking, inspection and forgery prevention source forming method and forgery prevention label
CN103761799B (en) A kind of bill anti-counterfeit method based on texture image feature and device
US7860268B2 (en) Object authentication using encoded images digitally stored on the object
US9153005B2 (en) Method and system for authenticating a secure document
US20050237577A1 (en) System and method for decoding digital encoded images
EP1986162A1 (en) Object authentication using a portable digital image acquisition device
US20090316950A1 (en) Object Authentication Using a Programmable Image Acquisition Device
JP2015515388A (en) Security element and method of checking the authenticity of the stamp
CN111950673B (en) Commodity anti-counterfeiting verification method, device and equipment based on two-dimensional code and storage medium
CN100375079C (en) Truth-identifying cellphone service method and system for purchase
CN112132245B (en) Anti-counterfeiting two-dimensional code and anti-counterfeiting verification method thereof
WO2009158324A1 (en) Object authentication using a programmable image acquisition device
KR102085561B1 (en) QR code forgery prevention apparatus and method
CN116644773A (en) Two-dimensional code generation and identification method with stealth anti-counterfeiting function
EP3992356B1 (en) Method for verifying product authenticity and establishing authorized product data with fabric features
CN109034850A (en) A kind of commodity anti-channel conflict information and method based on image information safe practice
JP2018504829A (en) Method for authenticating and verifying a security document based on measuring relative position variations in different processes involved in the creation of the security document
KR101777300B1 (en) Method and equipment for authenticating security patterns using parallax barrier
Mace Printer Identification Techniques and Their Privacy Implications
JP2023513640A (en) Computer-implemented method, data processing apparatus and computer program product for copy protection
CN116911872A (en) Article verification method, detection method for screen acquisition and label printed with graphic code
WO2017138842A1 (en) Method for manufacturing a value document and verifying the authenticity of same
KR20130029918A (en) Authentication method using 2-dimensional code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination