TW201835816A - Method for generating image data of a code, and method for determining authenticity or false of the code - Google Patents

Method for generating image data of a code, and method for determining authenticity or false of the code Download PDF

Info

Publication number
TW201835816A
TW201835816A TW107106180A TW107106180A TW201835816A TW 201835816 A TW201835816 A TW 201835816A TW 107106180 A TW107106180 A TW 107106180A TW 107106180 A TW107106180 A TW 107106180A TW 201835816 A TW201835816 A TW 201835816A
Authority
TW
Taiwan
Prior art keywords
code
image data
information
image
change
Prior art date
Application number
TW107106180A
Other languages
Chinese (zh)
Inventor
葛生仁
田中肇
尾方巌
Original Assignee
日商邁可羅科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 日商邁可羅科技股份有限公司 filed Critical 日商邁可羅科技股份有限公司
Publication of TW201835816A publication Critical patent/TW201835816A/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/305Associated digital information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Credit Cards Or The Like (AREA)
  • Record Information Processing For Printing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

A method for generating image data of a code that represents information associated with an article includes: generating, from the image representing the information, modified image data that represents an image which is modified in different manners for different articles or article groups; and storing the modified image data on a storage medium.

Description

產生碼之圖像資料之方法及碼之真偽判定方法Method for generating image data of code and method for authenticating code

本申請案係關於一種用以抑制物品上所附之碼之偽造之技術。This application relates to a technique for suppressing counterfeiting of a code attached to an article.

世間流通之各種商品中,例如將商品碼、表示製造年月日(或消費期限)、批次編號、或物品固有之序號等之碼印刷於該商品或包裝上。該等碼通常以一維或二維之條碼、及人類能夠讀取之可目視之字元(人類可讀字元)、或該等之組合之形態印刷。 此種碼之印刷可使用個人電腦(PC,personal computer)及印表機等通常市售之裝置進行。被印刷之碼例如可使用智慧型手機等搭載有相機之行動機器、或條碼讀取器等讀取裝置而讀取。用於碼之製作或讀取之應用軟體亦可容易地取得。因此,碼之便利性非常高,可於廣泛之目的下使用。 然而,另一方面,存在進行碼之偽造或改變之可能性。例如,有於非正規品之商品上附有與正規品相同之碼進行販賣之虞。於當前廣泛利用之一維或二維之條碼中,並無防偽之充分之機制。因此,消費者判斷商品為正規品或為仿造品通常並不容易。 作為使碼之偽造變得困難之技術,眾所周知有例如將條碼與全像圖組合進行印刷之技術。然而,利用全像圖之技術中存在碼之製作及印刷需要複雜之步驟之課題。又,假設於全像圖被偽造之情形時,消費者便無法容易地判斷有無偽造。 專利文獻1中,揭示有可以更簡便之方法防止商品上附有之二維條碼之複製之技術。專利文獻1中,揭示有於二維條碼之圖案上製作將包含各單元之尺寸以下之微小形狀之二次圖案組合而成之安全條碼之方法。微小形狀係可由條碼掃描器檢測之程度大小,但已足以小至由標準之(即,解像度不高之)複製器件複製之可能性較低。因此,專利文獻1中揭示之主旨係安全條碼無法容易地複製,可使偽造之可能性降低。 [先前技術文獻] [專利文獻] [專利文獻1]日本專利特開2016-19286號公報Among the various commodities circulating in the world, for example, a product code, a code indicating the date of manufacture (or the expiration date), a lot number, or a serial number unique to the article is printed on the product or package. The codes are typically printed in the form of one or two dimensional barcodes, human visual characters (human readable characters), or combinations thereof. The printing of such a code can be carried out using a commercially available device such as a personal computer (PC) or a printer. The code to be printed can be read by, for example, a mobile device such as a smartphone or a reading device such as a barcode reader. Application software for code creation or reading can also be easily obtained. Therefore, the convenience of the code is very high and can be used for a wide range of purposes. However, on the other hand, there is a possibility of making a forgery or change of the code. For example, a product with an informal product is attached with the same code as the regular product for sale. In the current widely used one-dimensional or two-dimensional bar code, there is no sufficient mechanism for anti-counterfeiting. Therefore, it is usually not easy for consumers to judge whether a product is a regular product or a counterfeit product. As a technique for making the forgery of the code difficult, for example, a technique of printing a barcode together with an hologram is known. However, the use of code-based techniques in the production and printing of holograms requires complex steps. Moreover, it is assumed that when the hologram is forged, the consumer cannot easily judge whether or not there is forgery. Patent Document 1 discloses a technique for preventing copying of a two-dimensional barcode attached to a product in a simpler manner. Patent Document 1 discloses a method of producing a security bar code in which a secondary pattern including a minute shape of each unit size or less is combined on a pattern of a two-dimensional barcode. The tiny shape is detectable by a bar code scanner, but is less than likely to be duplicated by a standard (i.e., low resolution) copy device. Therefore, the subject matter disclosed in Patent Document 1 is that the security bar code cannot be easily copied, and the possibility of counterfeiting can be reduced. [Prior Art Document] [Patent Document] [Patent Document 1] Japanese Patent Laid-Open No. 2016-19286

[發明所欲解決之問題] 本揭示提供一種可以與先前不同之方法抑制碼之偽造之新穎之碼產生方法。 [解決問題之技術手段] 本揭示之一態樣之碼產生方法係藉由處理器而產生表示與物品建立關聯之資訊之碼之圖像資料之方法。上述方法包含以下步驟:基於所輸入之上述資訊,按照特定之演算法產生表示上述資訊之碼之圖像資料;按照基於上述資訊之特定之規則,以依每一物品或每一物品群而異之態樣改變上述圖像資料;及將改變後之上述圖像資料記錄於記錄媒體。 本揭示之另一態樣之碼產生方法係藉由處理器而產生表示與物品建立關聯之資訊之一維或二維之碼之圖像資料之方法。上述方法包含以下步驟:基於所輸入之上述資訊,決定表示上述資訊之一維或二維之碼;產生表示於已決定之上述碼之區域之外側附加有至少1個標記之圖像之改變圖像資料;及將上述改變圖像資料記錄於記錄媒體。產生上述改變圖像資料之步驟包含基於與上述物品建立關聯之資訊,決定上述碼之區域之外側之1個以上之座標值;及於已決定之上述1個以上之座標值所示之位置,附加至少1個標記。上述至少1個標記之座標值係依每一物品或每一物品群而變更。 本揭示之進而另一態樣之碼產生方法係藉由處理器而產生表示與物品建立關聯之資訊之碼之圖像資料之方法。上述方法包含以下步驟:基於所輸入之上述資訊,產生表示將表示上述資訊之碼之圖像以依每一物品或每一物品群而異之態樣加以改變之圖像之改變圖像資料;及將上述改變圖像資料記錄於記錄媒體。上述碼包含一維或二維之條碼及人類可讀字元。產生上述改變圖像資料之步驟包含基於上述資訊,決定上述人類可讀字元之自上述圖像內之基準位置之位移量,使上述條碼與上述人類可讀字元之相對位置變化。 本揭示之另一態樣之真偽判定方法包含以下步驟:取得對印刷於物品上之碼進行拍攝而獲得之第1圖像資料;自記錄媒體取得藉由本揭示之任一碼產生方法而產生之改變後之圖像資料即第2圖像資料、或規定上述第2圖像資料之改變內容之改變用資料;基於上述第1圖像資料與上述第2圖像資料或上述改變用資料,判定上述第1圖像資料中之上述碼是否為正規之碼;及輸出表示判定結果之資料。 本揭示中綜合性或具體性之態樣可藉由裝置、系統、方法、積體電路、電腦程式、記錄媒體、或該等任意之組合而實現。 [發明之效果] 根據本揭示之一態樣,可相對容易地檢測碼之偽造,故可抑制碼之偽造。[Problems to be Solved by the Invention] The present disclosure provides a novel code generating method that can suppress the forgery of codes in a different method from the prior art. [Technical means for solving the problem] The code generating method of one aspect of the present disclosure is a method for generating image data of a code indicating information associated with an article by a processor. The above method comprises the steps of: generating image data representing a code of the above information according to a specific algorithm based on the input information; according to a specific rule based on the information, depending on each item or each group of articles The image data is changed in the aspect; and the changed image data is recorded on the recording medium. Another aspect of the present disclosure is a method of generating image data representing a one-dimensional or two-dimensional code of information associated with an item by a processor. The above method comprises the steps of: determining a one-dimensional or two-dimensional code representing the information based on the input information; generating a change map indicating an image with at least one mark added to an outer side of the determined code region Image data; and recording the above changed image data on a recording medium. The step of generating the changed image data includes determining one or more coordinate values on the outer side of the region of the code based on the information associated with the article; and determining the position indicated by the one or more coordinate values determined above, Attach at least 1 tag. The coordinate values of the at least one mark are changed for each item or group of items. Still another aspect of the present disclosure is a method of generating a code image representing a code of information associated with an item by a processor. The above method comprises the steps of: generating, based on the information entered, a changed image data representing an image in which an image representing the information of the information is changed according to an aspect of each item or each group of articles; And recording the changed image data on the recording medium. The above code contains one or two dimensional barcodes and human readable characters. The step of generating the changed image data includes determining a displacement amount of the reference position of the human readable character from the image based on the information, and changing a relative position of the barcode to the human readable character. Another method for authenticity determination of the present disclosure includes the steps of: obtaining a first image data obtained by capturing a code printed on an article; and obtaining from the recording medium by any code generation method of the present disclosure. The changed image data, that is, the second image data or the data for changing the content of the change of the second image data; and based on the first image data, the second image data, or the change data, Determining whether the code in the first image data is a normal code; and outputting data indicating the determination result. The comprehensive or specific aspects of the present disclosure can be realized by a device, a system, a method, an integrated circuit, a computer program, a recording medium, or any combination thereof. [Effects of the Invention] According to an aspect of the present invention, forgery of a code can be detected relatively easily, so that forgery of a code can be suppressed.

(概要) 於說明本揭示之具體之實施形態之前,首先說明本揭示之技術概要。 本揭示係關於將表示與物品建立關聯之各種資訊之碼之圖像特意地改變(編輯)進行記錄或印刷之技術。將如此特意地改變所得之圖像印刷於物品或其包裝等之情形時,未知特定規則之第三者無法使用通常之裝置與軟體,印刷相同之圖像。因此,可降低偽造之可能性。又,可判定物品上所附之碼之圖像為正規圖像抑或是偽造圖像(真偽)。例如,可實現如下之應用,即,基於由智慧型手機等讀取裝置讀取之條碼之圖像,判定該條碼之真偽。 本說明書中所謂「碼」係指表示與物品建立關聯之資訊之圖形、記號、花紋、或字元、或者該等任意之組合。典型而言,碼可為一維碼(通常之條碼)、二維碼(例如矩陣碼或堆疊碼)、或字串(包含數字、字母及其他字元之組合)、或該等組合。二維碼通常多被稱為二維條碼。因此,亦於本說明書中,存在不僅對於一維碼,而且對於二維碼亦使用「條碼」之術語之情形。碼並非必須包含一維或二維之條碼。碼亦可僅由字串(例如人類可讀字元)表達。 碼表示與物品(例如製造物等商品)建立關聯之各種資訊。此種資訊例如可為商品碼、製造年月日、消費期限、批次編號、或物品固有之序號、或該等任意之組合。除此處列舉之資訊以外之資訊亦可包含於碼。例如,碼亦可表達如網站之URL(Uniform Resource Locator,統一資源定位器)之資訊。 碼例如可附於產業機器、民生用機器、醫藥品、食品、衣料、裝飾品、生活雜貨等商品、活動之入場券、或優惠券等。於本說明書中,將可附碼之此類有形物總體稱為「物品」。 所謂將碼「附於」物品係指將該碼印刷於該物品或其包裝之表面。物品上所附之碼可使用搭載有相機之智慧型手機或條碼讀取器等讀取裝置而讀取。 於本說明書中,所謂「碼之圖像資料」係指表示該碼之圖像之資料。碼之圖像資料並不限定於具有依據JPEG、PNG、BMP等公知規格之檔案形式之圖像資料,亦可為任意形式之資料。有時將碼之圖像資料簡稱為「碼圖像」。 於本說明書中,所謂「改變圖像資料」係指表示對原本之碼圖像進行用以防偽之改變所得之圖像之資料。改變圖像資料亦並不限定於具有依據JPEG、PNG、BMP等公知規格之檔案形式之圖像資料,亦可為任意形式之資料。例如,改變圖像資料亦可為對原本之圖像資料附加表示用以防偽之改變之內容之資料所得之資料或信號。 本揭示之例示性實施形態之碼產生方法係藉由處理器(或電腦)而產生表示與物品(例如製造物)建立關聯之資訊之碼之圖像資料之方法。於某實施形態中,上述方法包含以下步驟:(1)基於所輸入之資訊,按照特定之演算法產生表示上述資訊之碼之圖像資料;(2)按照基於上述資訊之特定之規則,以於每一物品或每一物品群中不同之態樣改變上述圖像資料;及(3)將改變後之上述圖像資料記錄於記錄媒體。該方法亦可更包含以下步驟:(4)將改變後之上述圖像資料印刷於上述物品或其包裝上。 上述(1)之步驟例如相當於產生通常之一維或二維之條碼之步驟。處理器例如可藉由執行公知之條碼產生用之程式而產生條碼。但,並不限定於此,「特定之演算法」亦可為產生僅包含人類可讀字元之碼之圖像資料之演算法。 上述(2)之步驟係藉由特意地改變上述(1)之步驟中產生之碼之圖像資料而使碼之偽造變得困難。於該步驟中,例如可按照特定之規則以於每一商品碼、每一批次編號、或每一序號中不同之態樣而改變圖像資料。藉此,於每一物品(例如每一序號)或每一物品群(例如每一商品碼或批次編號)產生固有之改變圖像資料。 上述(3)之步驟係將改變後之圖像資料記錄於硬碟驅動器等任意之記錄媒體中以便能夠於其後之(4)之印刷步驟中利用之步驟。改變後之圖像資料亦可與附有該碼之物品之資訊建立關聯地記錄。被記錄之資料能夠於進行真偽判定時被參考。 於上述(4)之步驟中,改變後之圖像資料係印刷於物品或其包裝上。該步驟可藉由通常之印表機或印刷機執行。 如此,本揭示之實施形態之處理器將物品上所附之碼之圖像資料,按照基於其原資訊之特定之規則特意地改變。例如,藉由基於原資訊之特定之加密處理而改變圖像資料。此時,處理器亦可例如產生規定改變之內容之改變用資料(亦稱為「防偽碼」),並根據該改變用資料改變碼之圖像資料。 於上述(1)之步驟中產生之圖像資料係按照通常之碼產生演算法所產生、且未實施防偽對策之圖像資料。該圖像資料亦可並不明確地產生。產生改變圖像資料之裝置亦可自所輸入之資訊來產生改變圖像資料而不產生通常之碼圖像資料。 如以下詳細地說明,圖像資料之改變之態樣係多種多樣。例如,可為以下之方法。 (1)根據以防偽碼表示之值,使原本之碼之列印位置變化。 (2)於併用碼與人類可讀字元之情形時,使其等之相對位置基於防偽碼變化。 (3)於原本之碼之區域內部之由防偽碼表示之座標,附加標記(例如黑或白之標記)。 (4)於原本之碼之區域之周圍,於由防偽碼表示之座標附加標記(例如黑或白之標記)。 (5)準備與原本之碼中不同之字元標記(字串之標記),使其之座標、角度、字型、大小等變化。 亦可將上述(1)~(5)之方法任意組合地適用。藉由以上方法而使未知特定之規則之第三者無法進行完全相同之印刷。又,難以使用通常之裝置與軟體,偽造標記。 進而,可使讀取裝置或伺服器電腦具有真偽判定功能,進行真偽之判定。例如,可使用智慧型手機或平板電腦等附相機之資訊機器,根據拍攝印刷於商品上之碼所得之圖像資料,進行該碼之真偽之判定。真偽之判定例如可由安裝有判定用之應用軟體之資訊機器(讀取裝置)而執行。或者,經由網路(例如網際網路)連接於讀取裝置之伺服器電腦亦可執行真偽之判定。伺服器電腦根據自讀取裝置發送之圖像資料、與實際印刷之圖像資料或規定其之碼之改變內容之改變用資料,進行真偽之判定,並將判定結果送返至讀取裝置。藉由此種系統,使用者可利用智慧型手機等行動機器,立即獲知商品為正品抑或是仿造品。 再者,不具有真偽判定功能之通常之讀取裝置無法進行真偽之判定。然而,即便通常之讀取裝置,亦能夠與通常之碼同樣地讀取已進行防偽碼之編輯之碼。因此,可維持先前之便利性。 條碼等印刷物於印刷或流通之過程中有可能產生髒污或缺損等印刷錯誤。因此,進行由機械讀取之任何碼系統,均設計成容許若干印刷錯誤。尤其於二維條碼系統中,安裝有利用李德所羅門碼等之高度之錯誤訂正功能,以能夠於發生碼錯誤之情形時亦能夠無障礙地進行讀取。因此,即便於碼之內部或周圍按照特定之規則特意地追加有標記等,亦可無太大障礙地進行讀取。因此,不會損害作為通常之系統之功能。換言之,本揭示之實施形態中進行之改變係對通常之讀取無障礙之程度之改變。 判定真偽之裝置可藉由解析由拍攝而取得之圖像資料,識別例如碼之圖像上附有之標記為按照特定之規則特意地附加之標記抑或是除此以外之髒污或缺損。 先前,認為條碼等碼之圖像如何清楚且正確地印刷較為重要。先前未曾設想過強行打亂排版、或附加與碼無關之標記。於本揭示之實施形態中,例如藉由依每一物品或每一物品群特意地打亂排版或附加標記而能夠更容易地進行真偽之判定。 以下,說明本揭示之更具體之實施形態。惟有時省略過於詳細之說明。例如,存在省略已充分瞭解之事項之詳細說明或對於實質上相同之構成之重複說明之情形。其目的在於避免以下之說明變得過度冗長,使業者容易理解。再者,發明者為使業者充分地理解本揭示而提供隨附圖式及以下之說明,但並非藉此有意地地限定申請專利範圍中記載之主題。於以下之說明中,對於相同或類似之構成要素,標註相同之參考符號。 (實施形態) 本實施形態係關於一種藉由於印刷於商品上之條碼(例如二維之矩陣碼)之內部或外部附加微小之標記或字元標記(字串)、或改變人類可讀字元與條碼之相對位置而產生被改變之碼圖像資料之裝置及方法。又,本實施形態係關於一種判定被印刷之碼之真偽之系統及方法。 <碼圖像產生裝置> 圖1係表示本實施形態之碼圖像產生裝置(伺服器電腦30)之概略構成之方塊圖。伺服器電腦30係產生附於商品之矩陣碼之圖像資料之裝置。伺服器電腦30具備相互連接之處理器32、記憶體34、通訊電路36、及儲存器38。 處理器32例如可藉由CPU(Central Processing Unit,中央處理單元)或DSP(Digital Signal Processor,數位信號處理器)等電路而實現。處理器32藉由執行儲存於記憶體34中之電腦程式而進行下述之圖像產生處理。 記憶體34包含RAM(Random Access Memory,隨機存取記憶體)及ROM(Read Only Memory,唯讀記憶體)等記錄媒體。記憶體34儲存藉由處理器32執行之程式、及於處理之過程中產生之各種資料。 儲存器38例如係包含硬碟驅動器或固態驅動器等記錄媒體之裝置。儲存器38記錄藉由處理器32產生之碼之圖像資料等各種資料。再者,藉由處理器32產生之碼之圖像資料亦可記錄於伺服器電腦30之外部之其他儲存器(記錄媒體)中。此種其他儲存器經由網路(通訊線路)而連接於伺服器電腦30。 通訊電路36係經由網路而與其他機器進行通訊之電路。通訊電路36可藉由有線或無線直接地、或經由網際網路或LAN(Local Area Network,區域網路)等網路而連接於外部之裝置。通訊電路36例如可經由LAN而連接於印表機。又,通訊電路36可經由網際網路等網路而連接於智慧型手機等資訊機器。 除圖1所示之構成要素以外,伺服器電腦30還可具備例如電源電路、輸入輸出介面、顯示器等要素。但,其等要素與本實施形態之動作並非直接相關,故省略說明。 以下,說明藉由本實施形態之處理器32執行之產生碼圖像之處理。 圖2係表示處理器32對碼圖像之產生處理之基本流程之流程圖。處理器32接收表示應產生用於某商品之碼之主旨之指令(碼產生指示)後,執行圖2所示之動作。 於步驟S100中,處理器32取得與該商品相關之資訊(例如商品碼、製造年月日、批次編號、及序號等)。該資訊例如可與碼產生指示一併自使用者或其他裝置輸入。 於步驟S101中,處理器32基於所取得之資訊,按照特定之演算法產生碼之圖像資料。該圖像資料例如可按照公知之二維碼產生演算法而製作。作為一例,於使用作為二維碼之一種之DataMatrix ECC200之情形時,可藉由規定有依據ISO/IEC16022:2006之規格之演算法之軟體而產生碼之圖像資料。於使用其他種類之二維碼之情形時,亦可藉由使用規定有依據該碼之規格之演算法之軟體而產生碼之圖像資料。此種軟體中之若干例如已公開於網際網路上,可無償地利用。再者,於產生二維碼以外之碼(例如一維條碼或僅由字串構成之碼)之情形時,處理器32按照用以產生該碼之特定之演算法而產生圖像資料。 於步驟S102中,處理器32依據基於由碼所表達之資訊之特定之規則而改變(修正)碼之圖像資料。於本實施形態中,以於每一商品ID(identification,識別)、批次編號、或序號中不同之方法而改變圖像資料。例如,處理器32藉由於圖像資料內之基於序號等已決定之位置附加1個或複數個標記(防偽標記)而改變圖像資料。此時,處理器32亦可製作顯示表示附加標記之位置之座標值之資訊作為改變用資料(防偽碼),且與該商品建立關聯而記錄於儲存器38(記錄媒體)中。 考慮髒污或缺損,亦可將防偽標記於碼內之分離之位置配置複數個。又,亦可將複數個重疊方法併用。防偽標記根據讀取裝置(讀取器)之錯誤訂正能力而配置成於讀取時負擔不會變大之大小、且配置於負擔不會變大之位置。防偽標記於不損及真偽判定功能之範圍,設定為較通常之符號標記小且難以視認。 於步驟S104中,處理器32指示印表機將改變後之碼之圖像資料印刷於商品或其包裝上。藉此,將基於特定之規則改變後之碼之圖像印刷於商品或其包裝上。再者,碼圖像亦可印刷於除與商品建立關聯之包裝以外之物口(例如招牌或廣告等)。 一面參考圖3A至圖3F,一面說明本實施形態中製作之碼圖像之例。 圖3A係表示圖2之步驟S101中產生之碼圖像之一例之圖。此處,說明使用二維條碼之一種即DataMatrix碼作為碼之例。再者,於使用除DataMatrix碼以外之二維條碼、例如Quick Response(QR)碼、VeriCode、PDF417碼、Aztec碼、或MaxiCode等之情形時,亦能夠進行與以下說明之處理相同之處理。 二維條碼通常包含二維排列之複數個資料單元(以下,簡稱為「單元」)。複數個單元具有相同尺寸之正方形或長方形之形狀。複數個單元之一部分為明亮(或白色)之單元,另一部分為昏暗(或黑色)之單元。明亮之單元及昏暗之單元之一者表示0(零)值,另一者表示1值。由此,該等單元之明暗之二維圖案表示由0及1之數值行所表達之特定之資訊。 圖3B係表示圖2之步驟S102中改變後之碼圖像之一例之圖。於該例中,於碼之區域之內部附加有標記1(黑點)。附加標記1之位置(座標)係基於碼所表示之資訊而決定。例如,可於於每一序號或每一批次編號所唯一決定之位置附加標記1。 圖3C係表示改變後之碼圖像之另一例之圖。於該例中,於碼之區域之內部附加有2個標記1(黑點及白色點)。如該例般,亦可附加複數個標記1。於構成圖示之二維碼之複數個單元中,於明亮之單元附加有黑點,於昏暗之單元附加有白色點。於該情形時,改變用資料包含表示2個標記1之各者之座標值之資訊。 圖3D係表示改變後之碼圖像之進而另一例之圖。於該例中,於碼之區域之內部附加有3個標記1(黑點及2個白色點)。於該情形時,改變用資料包含表示3個標記1之各者之座標值之資訊。再者,標記1之個數亦可為4個以上。標記1之個數越多,則越能夠實現更多之改變之變化。又,即便於因髒污或缺陷而無法辨識一部分標記之情形時,亦為標記1之個數越多則越可提高能夠準確地進行真偽判定之可能性。 圖3E係表示改變後之碼圖像之進而另一例之圖。於該例中,標記1為圓記號而非點。如此,附加之標記1之形狀亦可為除點以外之形狀。 圖3F係表示改變後之碼圖像之進而另一例之圖。於該例中,將2個圓記號之標記1附加於碼之區域內。於構成二維碼之複數個單元中,於明亮之單元附加黑色圓,於昏暗之單元附加白色圓。於圖3F之例中,亦可附加3個以上之標記1。 標記例如亦可為三角形、四角形、星記號等記號或字元等。於附加複數個標記之情形時,亦可根據標記而使形狀不同。於該情形時,改變用資料亦可包含各個標記之形狀之資訊。 於以上之例中,於碼之內部附加有標記1,但亦可於碼之外部或與外部之交界部分附加1個以上之標記1。圖4A至圖4C表示此種例。 圖4A表示使碼之對準圖案(碼之外周部之L字狀之粗線)中之特定之部位為中空之例。於該例中,對準圖案上之3部位附加有白色標記1。如此,亦可於對準圖案附加1個以上之標記1。 圖4B表示於對準圖案之周圍附加有3個標記1(黑點)之例。該等標記1與對準圖案鄰接。圖4C表示與對準圖案之周圍分離而附加有3個標記1(黑點)之例。如該等例般,標記1之列印位置亦可為碼之區域之外側。 於以上之例中,規定碼圖像之改變內容之參數(改變用資料之要素)可為標記之個數、各標記之形狀、及各標記之圖像內之座標值(X座標及Y座標)。處理器32基於碼所表示之資訊中包含之序號或批次編號等資訊,按照特定之規則而決定該等參數。然後,按照已決定之參數,將1個以上之標記1與碼重疊。藉此,例如可以於商品之每一序號或批次編號中不同之態樣而印刷碼。 於以上之例中,所附加之標記1均小於碼中包含之各個單元之大小。又,附加有與明亮之單元及昏暗之單元之各者之個數相比相當少數量(例如未達1/10)之標記1。因此,於賦予標記1之後亦不會對碼之讀取造成障礙。 將二維條碼中之單元(亦稱為資料單元)之個數設為N,且將附加之標記之個數設為n。N根據碼之種類而不同,例如可為20以上之整數。標記之個數n為1以上N以下之整數,於某例中,2≦n≦N/10。於附有n個標記之情形時,規定碼之改變內容之改變用資料包含表示圖像資料內之n個座標值之資訊。處理器基於碼所表示之資訊而決定n個座標值,且於該n個座標值所表示之位置附加n個標記。n個座標值之組合根據該碼所表示之資訊(以下,有時稱為「原資訊」)而不同。該等標記之座標之組合例如與原資訊一對一地對應。藉由判定該等標記之座標之組合與自碼讀取之原資訊是否匹配而可判定碼之真偽。 除以上之例以外,亦能夠進行於二維碼之區域之周圍附加包含字串之字元標記之改變。藉由使字元標記之位置、角度、字型(包含尺寸、字體、字元間隔)、及字串之內容之至少1者於每一物品或每一物品群中不同而可獲得相同之防偽效果。 圖5A表示於碼之區域之周圍附加有字元標記2之碼圖像之一例。於該例中,將包含數字、字母、及記號之字串附加於碼之周邊上部。圖5B係表示於碼之區域之周圍附加有字元標記2之改變後之碼圖像之另一例之圖。於該例中,與圖5A所示之例相比較,字元標記2之內容、位置、及大小不同,且朝順時針方向傾斜。如此,處理器32亦可根據碼所表示之資訊而使字元標記2之位置(座標)、旋轉角度、字型等變化。於該情形時,規定改變之內容之參數(改變用資料)包含字串之內容、位置(座標)、及字型之資訊。該等參數例如可於碼所表示之每一序號或每一批次編號而唯一地決定。 除上述例以外,亦可將圖3A至圖3F、圖4A至4C、及圖5A及圖5B所示之改變方法加以組合。例如,亦可於二維碼之內部、對準圖案上、及外部之至少一部分附加1個以上之標記1,且於二維碼之外部附加1個以上之字元標記2。於此種形態中,改變用資料可包含各標記1之形狀、座標、尺寸、及各字元標記2之內容、座標、旋轉角度、字型等資訊。處理器32將其等資料與其碼或物品建立關聯而記錄於記錄媒體。該等資訊可用於下述之真偽判定處理。 其次,一面參考圖6A至圖6D,一面說明以與附加標記之方法不同之方法改變碼之圖像資料之例。於以下之例中,除二維之條碼外,碼還包含人類可讀字元。處理器32藉由使條碼或人類可讀字元之於圖像資料內之位置變化而改變圖像資料。條碼與人類可讀字元之相對位置藉由該動作而變化。該變化之方向及大小根據條碼所表示之資訊而決定。於該例中,改變用資料包含表示條碼及人類可讀字元之至少一者之自圖像資料內之基準位置起之位移量之資訊。 圖6A表示改變之前之碼圖像之例。於該例中,於二維條碼之橫向上,列印有由4列字串所構成之人類可讀字元。該人類可讀字元自上方起依序表示(01)商品碼、(21)序號、(10)批次編號、及(17)有效期限。此與二維條碼所表示之資訊相同。人類可讀字元之顯示態樣有各種,並不限定於圖示之態樣。 以圖6A所示之排版為基本,處理器32使條碼與人類可讀字元之相對位置關係根據條碼所表示之資訊而變化。例如,以於每一序號、或每一批次編號中不同之態樣使人類可讀字元之列印位置變化。 圖6B表示使人類可讀字元朝上方向(+Y方向)僅偏移0.5 mm之改變例。圖6C表示使人類可讀字元朝左方向(-X方向)僅偏移0.5 mm之改變例。圖6D表示使人類可讀字元朝下方向(-Y方向)僅偏移0.5 mm且朝右方向(+X方向)僅偏移1 mm之改變例。圖6B至圖6D中之「可目視字元:Y+0.5 mm」等之記載係為了方便說明而表示,實際上並未列印。於以下之圖中亦相同。圖6B至圖6D中之橫向之長方形之框實際上既可印刷亦可不印刷。 如該等例所示,藉由使條碼與人類可讀字元之相對位置按照基於條碼所表示之資訊之特定之規則變化而能夠進行真偽之判定。於該情形時,改變用資料包含X方向及Y方向之各者之自基準位置起之位移量之資訊。處理器32按照特定之規則,決定各方向之位移量。 亦可代替人類可讀字元而使條碼之位置以相同方法偏移。又,亦可使條碼及人類可讀字元之兩者自各自之基準位置偏移。於後者之例中,改變用資料(防偽碼)之參數數量變多,故能夠進行更多種改變。 處理器32係除使條碼與人類可讀字元之相對位置變化之外,亦可如先前之例般於條碼之內部或外部附加標記(例如記號、圖形、字元、或字串)。以下,對此種例進行說明。 圖7A至圖7E表示使人類可讀字元之列印位置根據條碼所表示之資訊而變更,並且於條碼之周圍附加標記(於該例中為點)之形態之若干例。圖7A表示人類可讀字元及點之兩者位於基準位置之例。圖7B表示人類可讀字元自其基準位置朝上方向偏移0.5 mm,點自其基準位置朝上方向偏移5 mm之例。圖7C表示人類可讀字元自其基準位置朝下方向偏移0.5 mm且朝右方向偏移0.5 mm,點自其基準位置朝上方向偏移8 mm且朝左方向偏移5 mm之例。圖7D表示人類可讀字元相對於其基準位置朝上方向偏移0.5 mm且朝右方向偏移0.5 mm,點相對於其基準位置朝上方向偏移5 mm且朝左方向偏移10 mm之例。圖7E表示人類可讀字元相對於其基準位置朝下方向偏移1 mm且朝右方向偏移0.5 mm,點相對於其基準位置朝下方向偏移2 mm且朝左方向偏移5 mm之例。 如該等例般,使碼與人類可讀字元之相對位置、及點(標記)之位置根據條碼所表示之資訊而變化,藉此能夠實現更豐富之改變之變化。於該等例中,標記之數量可為單數亦可為複數。為了提高於一部分標記因髒污或缺陷而無法辨識之情形時亦能夠準確地進行真偽判定之可能性,亦可增多標記之數量(例如3個以上)。 圖8A至圖8C係表示本實施形態之另一例之圖。於該等例中,碼僅包含二維條碼。處理器32使條碼之列印位置按照基於該條碼所示之資訊之特定之規則而變化。圖8A表示改變前之碼圖像。該例中之碼圖像包含包圍條碼之區域之矩形之框。處理器32使該框與條碼之區域之相對位置關係根據條碼所示之資訊而變化。圖8B表示條碼自基準位置朝左偏移0.2 mm且朝上偏移0.2 mm之例。圖8C表示條碼自基準位置朝右偏移0.2 mm且朝下偏移0.2 mm之例。於該等例中,改變用資料包含表示條碼之自圖像資料內之基準位置之於X方向及Y方向各者之位移量之資訊。處理器32基於改變用資料,藉由使條碼於圖像資料內之位置變化而改變圖像資料。 於以上之各例中,主要假定將二維條碼(矩陣碼)附於物品之情形。但,本揭示並不限定於此種例。本實施形態中之技術於碼為一維碼或字串之碼、或該等組合之情形時亦可同樣地使用。 圖9A至圖9C係表示本實施形態之另一例之圖。於該等例中,碼不包含條碼,僅包含人類可讀字元。處理器32使人類可讀字元之列印位置按照基於該人類可讀字元所示之資訊之特定之規則而變化。圖9A表示改變前之碼圖像。該例中之碼圖像包含包圍人類可讀字元之區域之矩形之框。處理器32使該框與人類可讀字元之區域之相對位置關係根據人類可讀字元所表示之資訊而變化。圖9B表示人類可讀字元自基準位置朝左偏移0.2 mm且朝上偏移0.2 mm之例。圖9C表示人類可讀字元自基準位置朝右偏移0.2 mm且朝下偏移0.1 mm之例。於該等例中,改變用資料包含表示人類可讀字元自圖像資料內之基準位置之於X方向及Y方向各者之位移量之資訊。處理器32根據改變用資料,藉由使人類可讀字元於圖像資料內之位置變化而改變圖像資料。 於以上之例中,亦可代替碼(條碼或人類可讀字元)之位置之變化、或除此之外使碼之旋轉角度變化。於將人類可讀字元列印之形態下,亦可使人類可讀字元之字型(大小、字體、字元間隔等)於每一物品或每一物品群而變化。藉由將此種方法組合而能夠實現更多種改變之變化。 以如上方法製作之碼之圖像資料可按照通常二維條碼之讀取順序而讀取。此時,附加之防偽標記等被視作髒污或缺損,且進行錯誤修正。因此,與未進行用於防偽之改變之條碼同樣地正常地進行讀取。因此,不先前之系統中之運用不會受損。 其次,更具體地說明按照特定之規則改變碼圖像之處理。 圖10A係表示改變碼圖像之處理(圖2中之步驟S102)之更具體之例之流程圖。此處,說明作為一例之於碼之區域之內部或外部附加1個或複數個點標記之例。 於該例中,處理器32自圖2中之步驟S101中所產生之碼之資料(原資訊)而決定代表該資料之數值、即雜湊值(步驟S220)。雜湊值係明確表示原資訊之內容之值,一般而言具有較原資訊小之資訊量。處理器32使用用以自原資訊獲得雜湊值之雜湊函數(例如加密之雜湊函數)而計算雜湊值。若考慮防偽之本實施形態之目的,則雜湊函數較佳為設計成產生自原本之碼難以推斷之雜湊值。 其次,處理器32進行自計算所得之雜湊值向印刷資訊(改變用資料)之轉換。處理器32參考預先準備之碼表(查找表),決定改變用資料(於該例中為各點標記之座標值)(步驟S221)。表例如可以滿足以下條件之方式製作。 ∙點標記之數量為特定之數量或特定範圍內之數量。例如,附加3個、4個、4個以下等不醒目數量之點標記。 ∙點標記之密度為特定之值以下。即,避免於鄰接之位置附加複數個點標記,使其難以醒目。例如,於5×5單元之區域內僅附加1個標記。 ∙於碼之內部配置點標記之情形時,減小原本之碼之讀取負擔。即,不妨礙無防偽功能之通常之讀取器之讀取。 ∙點圖案間之漢明距離為固定距離以上。亦即避免相似之配置。藉此,即便於點標記之一部分缺損之情形時,亦能製作可修復之機制。 滿足如上之條件之表係預先製作,且保存於記憶體等記錄媒體中。處理器32參考表,自雜湊值決定各點之位置(座標)。處理器32藉由將點標記配置於已決定之座標而產生已改變之碼圖像(步驟S222)。 圖10B係模式性表示自原資訊至產生改變用資料為止之流程之圖。如上所述,處理器32使用雜湊函數,自資訊量相對較多之原資訊算出資訊量更少之雜湊值。其次,參考碼表(表),自雜湊值決定改變用資料(例如座標值之組合)。然後,基於已決定之改變用資料而改變碼之圖像資料。根據此種動作,可經由資訊量相對較少之雜湊值進行真偽判定。因此,可抑制判定所需之計算量。 圖10C係模式性表示表之一例之圖。該表規定雜湊值與配置碼之複數個座標值之組合(改變用資料)之對應關係。雜湊值與座標值之組合一對一地對應。因此,自雜湊值唯一地決定改變用資料。相反,亦可自改變用資料唯一地確定雜湊值。如下所述,藉由該機制而可容易地判定有無碼之偽造。 變更字串或符號之排版而並非將標記附加於碼圖像之改變亦可藉由相同之處理而實現。於該情形時,代替圖10C所示之表而預先製作例如圖10D所示之表並進行記錄。表例如可以滿足如下條件之方式設計。 ∙排版之變化可藉由目視或機械讀取而辨識,且不醒目。例如,對於 ±X方向及±Y方向之各者,將0~2.5 mm程度之範圍內之值以0.5 mm之刻度設為變化量。 ∙使排版圖案之變化不變成有序。即,難以自序號等資訊推斷排版圖案。 ∙使排版圖案均等地分佈。即,不出現以較高之頻度配置於特定之部位之情形。 處理器32可參考以滿足如上條件之方式製作之表,決定人類可讀字元等之位移量,製作印刷資料。 於進行變更字串或符號之排版且將1個以上之標記附加於碼之內部或外部之改變之情形時,亦進行基本相同之處理。於該情形時,例如可利用圖10E所示之表。該例之表中,作為改變用資料,包含附加之各標記之座標值之資訊、與移動對象(例如字串或符號)之移動量之資訊。處理器32參考此種表,將標記附加於原本之碼圖像,且變更人類可讀字元等之排版。 將符號或字串之旋轉、或字串之字型變更之改變亦能夠藉由相同之處理而實現。亦於該情形時,預先製作與圖10C、10D所示之表類似之表。處理器32參考表,根據雜湊值製作改變用資料(例如旋轉角度、字元尺寸、字元之字體、字元間隔等),將原本之碼圖像改變後記錄。表例如只要以滿足如下條件之方式製作即可。 ∙使變化之態樣不變得有序。即,難以根據序號等資訊,推斷排版圖案。 ∙使變化之態樣均等地分佈。即,不出現以較高頻度呈現特定之變化態樣之情形。 ∙使變化之態樣不相互類似。即,即便存在髒污或缺陷之情形時亦容易推斷準確之圖案。 於圖10A至圖10E所示之例中,處理器使用雜湊函數自碼所表示之原資訊算出雜湊值,根據該雜湊值,參考表(碼表)決定改變用資料(防偽碼)。但,此種處理僅為一例。處理器例如亦可根據碼所表示之原資訊,使用特定之函數或表等直接地決定改變內容。根據原資訊按照特定之規則決定改變內容之方法並不限定於特定之方法。 <真偽判定系統> 其次,說明判定物品上所附之條碼是否為正品者之系統(真偽判定系統)之例。 可使用智慧型手機或平板電腦等資訊機器(讀取裝置),判定物品上所附之條碼與正品上所附之條碼是否相同。為了進行該判定,而於讀取裝置上預先安裝判定用之應用軟體(應用程式)。本揭示之真偽判定之方法中,大致分為以下兩種方法。 (1)將與表示碼圖像之印刷時適用之特定之規則之防偽碼(改變用資料)相同或對應之資料預先記錄於讀取裝置中,不進行通訊而由讀取裝置單獨地進行真偽判定。 (2)不使讀取裝置具有與表示印刷時適用之特定之規則之防偽碼相關之資料,讀取裝置經由通訊線路查詢伺服器或記錄裝置。伺服器進行真偽之判定,且將判定結果送返至讀取裝置。 本實施形態之真偽判定系統能夠以上述(1)、(2)之任一方法而實現。(1)之方法可以簡單之構成實現,故具有系統構築容易之優點。(2)之方法中,讀取裝置不具有表示真偽判定之規則之資料,故即便讀取裝置被解析亦不會有該規則洩漏之虞而具有安全上之優點。進而,(2)之方法中,可視需要進行更新判定規則等之調整,從而可較高地維持安全強度。因此,於重視以低成本且簡單之構成構築系統之情形時,較佳為採用(1)之方法。另一方面,於重視提高安全強度之情形時,較佳為採用(2)之方法。 以下,首先說明適用(2)之方法之真偽判定系統之例,繼而說明適用(1)之方法之真偽判定系統之例。 圖11係模式性表示適用上述(2)之方法之真偽判定系統之整體構成之例之圖。本系統具備伺服器電腦30(以下,簡稱為「伺服器30」)、印表機40、儲存器50、及智慧型手機10等構成要素。伺服器30以上述任一方法產生附於商品5之碼之圖像資料(改變所得之圖像資料),保存於儲存器50。印表機40基於該圖像資料,將碼印刷於商品5或其包裝上。印刷有碼之商品5經流通過程轉交給消費者處。消費者可使用智慧型手機10,判定商品5是否為正品。為此,於智慧型手機10中預先安裝真偽判定用之應用軟體(應用程式)。 圖12係表示智慧型手機10(讀取裝置)之概略構成之方塊圖。智慧型手機10具備處理器12、記憶體14、通訊電路16、相機18、及顯示器20。處理器12藉由執行儲存於記憶體14中之電腦程式(應用程式)而執行下述動作。於本實施形態中,將由相機18拍攝所得之圖像資料經由通訊電路16輸送至遠程之伺服器30。 圖13係表示真偽判定動作之一例之流程圖。於進行真偽判定時,根據消費者(使用者)之操作,處理器12執行真偽判定用之應用程式(程式)。處理器12使促使由智慧型手機10之相機18拍攝商品5之附有條碼之部位之圖像顯示於顯示器20。消費者拍攝該部位(步驟S10)後,通訊電路16將該圖像資料經由基站90及網路100(例如網際網路)輸送至伺服器30(步驟S11)。伺服器30基於保存於儲存器50中之改變用資料,判定輸送而來之圖像資料中包含之條碼是否為正品之條碼(步驟S13)。伺服器30將表示判定結果之資料經由網路100及基站90發送至智慧型手機10(步驟S14)。智慧型手機10之處理器12將判定結果顯示於顯示器20(步驟S15)。藉此,消費者可確認商品5上所附之條碼是否為正規之條碼。 圖14係更具體地表示步驟S13之真偽之判定處理之流程圖。伺服器30之處理器32根據輸送而來之圖像資料中包含之碼,確定附有該碼之物品(步驟S200)。例如,讀取該碼所表示之商品碼、批次編號、序號等資訊,確定該物品。該讀取例如可利用公知之二維碼讀取用之演算法進行。其次,自儲存器50等記錄媒體取得於該物品上印刷碼時使用之改變用資料(步驟S201)。此處取得之改變用資料例如可為圖10C至圖10E中例示之表中包含之資料。處理器32判定輸送而來之圖像資料(以下,有時稱為「拍攝資料」)中是否已反映改變用資料所表示之改變(步驟S202)。該判定例如可根據與根據拍攝資料中包含之碼算出之雜湊值對應之改變內容、與拍攝資料之改變內容(例如,附加之標記之位置之組合、及/或排版)是否匹配而進行。於碼圖像為被偽造者之情形時,兩者不匹配。因此,可判斷附有該碼圖像之商品並非正品。判定亦可使用公知之圖像匹配技術進行。 於判定輸送而來之圖像資料中包含之碼為正規碼之情形時,處理器32將該主旨之資訊發送至智慧型手機10。於判定輸送而來之圖像資料中包含之碼並非正規碼之情形時,處理器32將該主旨之資訊發送至智慧型手機10。 再者,處理器32亦可使用於印刷時所用之改變後之圖像資料判定真偽而代替根據改變用資料判定真偽。即,處理器32亦可將輸送而來之圖像資料與印刷時所用之圖像資料對照而判定同一性。於該情形時,例如可使用公知之圖像匹配技術而判定2個圖像之同一性。 於本實施形態中,由同一伺服器30進行碼圖像之產生及真偽判定,但亦可使不同之裝置執行該等動作。亦可將進行碼圖像之產生及印刷之系統、與進行真偽判定之裝置或系統配置於遠離之處。 圖15A及圖15B係表示判定結果之顯示例之圖。圖15A表示判定所拍攝之碼與正規品之碼一致之情形時之顯示例。於該情形時,於顯示器20中可顯示所拍攝之碼與正規品之碼一致之主旨、例如「為正規品之碼」之詞句。圖15B表示判定所拍攝之碼與正品之碼不一致之情形時之顯示例。於該情形時,於顯示器20中可顯示所拍攝之碼與正規品之碼不一致之主旨、例如「非正規品之碼」之詞句。此時,如圖15B所示,亦可導入以下機制,即進行「聯絡製造商」等按鈕之顯示,且輕叩該顯示,藉此,顯示製造商之聯絡地址資訊,或可藉由電子郵件等而聯絡製造商。 於本實施形態中,雲端上之伺服器30判定所讀取之碼之圖像之真偽。智慧型手機10(讀取裝置)僅將拍攝資料發送至伺服器30,且自伺服器30接收並顯示表示判定結果之資料。因此,即便解析讀取裝置之內部資料,亦無法確定用於碼圖像之改變之規則。由於無規則洩漏之虞,故可確保較高之安全。 其次,說明智慧型手機10等讀取裝置進行自身真偽之判定而非伺服器30進行自身真偽之判定之例(上述(2)之例)。圖16係模式性表示該例中之真偽判定系統之圖。於該例中,真偽判定系統僅包含智慧型手機10。智慧型手機10之處理器12藉由執行儲存於記憶體14中之電腦程式而不經由通訊線路便進行與上述相同之判定處理。除真偽判定用之程式以外,智慧型手機10之記憶體14中還預先記錄有碼圖像之製作時適用之表示特定之規則之資料。 圖17係表示智慧型手機10之真偽判定處理之例之流程圖。智慧型手機10根據來自使用者之拍攝指示,由相機18拍攝商品上附有之碼(步驟S300)。拍攝碼之後,處理器12自拍攝資料中包含之碼確定該物品(步驟S301)。例如,根據該碼所表示之商品碼、批次編號、序號等資訊而確定該物品。該讀取例如可利用公知之二維碼讀取用之演算法進行。其次,處理器12對記憶體14(或其他記錄媒體)進行存取,取得經確定之物品之改變用資料(步驟S302)。處理器12根據拍攝資料與改變用資料,判定拍攝資料中是否已反映改變用資料所表示之改變(步驟S303)。該判定例如可基於與根據拍攝資料中包含之碼算出之雜湊值對應之改變內容、與拍攝資料之改變內容(例如,附加之標記之位置之組合、及/或排版)是否匹配而進行。判定亦可使用公知之圖像匹配技術進行。於判定拍攝資料中包含之碼為正規碼之情形時,處理器12將該主旨之資訊顯示於顯示器20。於判定拍攝資料中包含之碼並非正規碼之情形時,處理器12將該主旨之資訊發送至顯示器20。 處理器12亦可使用印刷時所用之改變後之圖像資料判定真偽而代替基於改變用資料判定真偽。即,處理器12亦可將拍攝資料與印刷時所用之圖像資料對照而判定同一性。於該情形時,例如可使用公知之圖像匹配技術而判定2個圖像之同一性。 於該例中,智慧型手機10可單獨判定物品之真偽而不經由網路。因此,與圖11之例相比較,可使系統之構成簡單。 如上所述,本實施形態之真偽判定方法包含以下步驟:取得拍攝印刷於物品上之碼所得之圖像資料(第1圖像資料);自記錄媒體取得實際使用之改變後之圖像資料(第2圖像資料);藉由將第1圖像資料與第2圖像資料(或改變用資料)對照而判定第1圖像資料中之碼是否為正規之碼;及輸出表示判定結果之資料。藉此,可簡便地判定碼之真偽。 於上述例中,讀取裝置為智慧型手機,但亦可為其他資訊機器。例如,亦可將平板電腦、條碼讀取器、筆記型PC(膝上型PC)等用作讀取裝置。讀取裝置中之相機(或拍攝元件)及顯示器亦可不收納於與處理器及記憶體相同之殼體。於真偽判定之對象即碼為除二維碼以外之碼(例如一維條碼或人類可讀字元)之情形時,上述技術亦可同樣地適用。 產業上之利用可能性 本揭示之實施形態之產生碼圖像之方法及裝置可用於將一維或二維之條碼、或者人類可讀字元等碼印刷於製造品等物品之用途。(Outline) Before explaining the specific embodiments of the present disclosure, the technical summary of the present disclosure will be first described. The present disclosure relates to a technique of intentionally changing (editing) an image representing a code of various information associated with an article for recording or printing. When the image thus obtained is intentionally changed to be printed on an article or its package or the like, a third party who does not know the specific rule cannot print the same image using the usual device and software. Therefore, the possibility of forgery can be reduced. Moreover, it can be determined whether the image of the code attached to the article is a regular image or a forged image (authentic). For example, an application can be realized in which the authenticity of the barcode is determined based on an image of a barcode read by a reading device such as a smart phone. The term "code" as used in this specification refers to a graphic, a symbol, a pattern, or a character, or any combination thereof, indicating information associated with an article. Typically, the code can be a one-dimensional code (typically a bar code), a two-dimensional code (such as a matrix code or a stacked code), or a string (including a combination of numbers, letters, and other characters), or combinations thereof. Two-dimensional codes are often referred to as two-dimensional barcodes. Therefore, also in the present specification, there is a case where the term "bar code" is used not only for the one-dimensional code but also for the two-dimensional code. The code does not have to contain a one- or two-dimensional bar code. The code can also be expressed only by strings (eg, human readable characters). The code represents various information associated with an item (such as a product such as a product). Such information may be, for example, a product code, a manufacturing date, a consumption period, a lot number, or a serial number inherent to the item, or any combination thereof. Information other than the information listed here may also be included in the code. For example, the code can also express information such as a URL (Uniform Resource Locator) of a website. For example, the code may be attached to an industrial machine, a consumer machine, a pharmaceutical product, a food, a clothing, an ornament, a groceries, a ticket, or a coupon. In this specification, such tangible items that can be attached are collectively referred to as "items." By "attaching" a code to an article is meant printing the code on the surface of the article or its packaging. The code attached to the item can be read using a reading device such as a smart phone or a bar code reader equipped with a camera. In the present specification, the "image data of a code" refers to information indicating an image of the code. The image data of the code is not limited to image data having a file format according to a known specification such as JPEG, PNG, BMP, or any form of data. The image data of the code is sometimes simply referred to as a "code image." In the present specification, the term "changing image data" refers to information indicating an image obtained by performing an anti-counterfeiting change on an original code image. The image data to be changed is not limited to image data having a file format according to a known specification such as JPEG, PNG, or BMP, and may be any form of data. For example, changing the image data may also be a data or signal obtained by attaching information indicating the content of the anti-forgery change to the original image data. The code generation method of the exemplary embodiment of the present disclosure is a method of generating image data of a code indicating information associated with an item (for example, a manufactured object) by a processor (or a computer). In an embodiment, the method includes the following steps: (1) generating image data representing a code of the information according to a specific algorithm based on the input information; (2) according to a specific rule based on the information, And changing the image data in different manners in each item or each item group; and (3) recording the changed image data on the recording medium. The method may further comprise the following steps: (4) printing the changed image data on the article or its packaging. The step (1) above corresponds, for example, to the step of generating a bar code of one or two dimensions. The processor can generate a bar code, for example, by executing a program for generating a known bar code. However, the present invention is not limited thereto, and the "specific algorithm" may be an algorithm that generates image data of a code containing only human readable characters. The above step (2) makes it difficult to forge the code by intentionally changing the image data of the code generated in the above step (1). In this step, for example, the image data may be changed in accordance with a specific rule for each commodity code, each batch number, or a different aspect in each serial number. Thereby, inherently altered image data is generated for each item (eg, each serial number) or each group of items (eg, each item code or batch number). The step (3) above is a step of recording the changed image data on an arbitrary recording medium such as a hard disk drive so as to be able to be utilized in the subsequent printing step (4). The changed image data can also be recorded in association with the information of the item to which the code is attached. The recorded data can be referred to when making authenticity decisions. In the step (4) above, the changed image data is printed on the article or its packaging. This step can be performed by a conventional printer or printer. Thus, the processor of the embodiment of the present disclosure intentionally changes the image data of the code attached to the article in accordance with the specific rules based on the original information. For example, the image data is changed by a specific encryption process based on the original information. At this time, the processor may, for example, generate a change data (also referred to as a "security code") for specifying the changed content, and change the image data of the code according to the change data. The image data generated in the above step (1) is image data generated by a normal code generation algorithm and which is not subjected to anti-counterfeiting measures. The image data may also not be explicitly generated. The means for generating the changed image data may also generate the changed image data from the input information without generating the normal code image data. As explained in detail below, the state of change of image data is varied. For example, it can be the following method. (1) The position of the original code is changed according to the value indicated by the security code. (2) In the case of a combination of a code and a human readable character, the relative position of the code is changed based on the security code. (3) The coordinates indicated by the security code inside the original code area, with additional marks (such as black or white marks). (4) Attach a mark (such as a black or white mark) to the coordinates indicated by the security code around the area of the original code. (5) Prepare a character tag (mark of a string) different from the original code to change its coordinates, angle, font size, size, and the like. The methods (1) to (5) above may be applied arbitrarily in combination. By the above method, the third party of the unknown specific rule cannot make the exact same printing. Moreover, it is difficult to use conventional devices and software to falsify marks. Further, the reading device or the server computer can be made to have an authenticity determination function, and the authenticity can be determined. For example, an information device with a camera such as a smart phone or a tablet computer can be used to determine the authenticity of the code based on the image data obtained by capturing the code printed on the product. The determination of the authenticity can be performed, for example, by an information device (reading device) to which the application software for determination is installed. Alternatively, the server computer connected to the reading device via a network (for example, the Internet) can also perform the determination of authenticity. The server computer determines the authenticity based on the image data sent from the reading device, the image data actually printed, or the data for changing the content of the specified code, and returns the determination result to the reading device. . With this system, users can use mobile devices such as smart phones to immediately know whether the product is genuine or counterfeit. Furthermore, a normal reading device that does not have an authenticity determination function cannot perform the determination of authenticity. However, even in the case of a normal reading device, the code for which the security code has been edited can be read in the same manner as the normal code. Therefore, the previous convenience can be maintained. Printed materials such as barcodes may cause printing errors such as dirt or defects during printing or distribution. Therefore, any code system that is read by the machine is designed to allow for a number of printing errors. In particular, in the two-dimensional bar code system, an error correction function using a height such as a Lie Solomon code is installed so that reading can be performed without any trouble in the case of a code error. Therefore, even if a mark or the like is intentionally added to the inside or around the code in accordance with a specific rule, the reading can be performed without much trouble. Therefore, it does not impair the function as a normal system. In other words, the changes made in the embodiments of the present disclosure are changes to the extent of normal readability. The device for authenticating can analyze the image data obtained by the shooting to identify, for example, a mark attached to the image of the code as a mark that is intentionally attached according to a specific rule or a dirty or defective other than the other. Previously, it was important to think that the image of the barcode and the like was clearly and correctly printed. It has not been previously conceived to forcibly typeset, or to attach tags that are not related to the code. In the embodiment of the present disclosure, the authenticity determination can be more easily performed, for example, by intentionally disturbing the typesetting or the additional mark for each item or each item group. Hereinafter, more specific embodiments of the present disclosure will be described. However, the explanations that are too detailed are sometimes omitted. For example, there may be a detailed description that omits well-understood matters or a repetitive description of substantially identical configurations. The purpose is to avoid the following explanation becoming too lengthy and easy for the operator to understand. In addition, the inventors have provided the following description of the accompanying drawings and the following description in order to fully understand the present disclosure, but do not deliberately limit the subject matter described in the claims. In the following description, the same or similar constituent elements are denoted by the same reference numerals. (Embodiment) This embodiment relates to a method of adding a minute mark or a character mark (a string) by a bar code (for example, a two-dimensional matrix code) printed on a commodity, or changing a human readable character. Apparatus and method for generating altered image data from a position relative to a bar code. Further, this embodiment relates to a system and method for determining the authenticity of a printed code. <Code Image Generating Apparatus> Fig. 1 is a block diagram showing a schematic configuration of a code image generating apparatus (server computer 30) according to the present embodiment. The server computer 30 is a device that generates image data attached to the matrix code of the product. The server computer 30 includes a processor 32, a memory 34, a communication circuit 36, and a storage 38 that are connected to each other. The processor 32 can be realized by, for example, a CPU (Central Processing Unit) or a DSP (Digital Signal Processor). The processor 32 performs the following image generation processing by executing a computer program stored in the memory 34. The memory 34 includes a recording medium such as a RAM (Random Access Memory) and a ROM (Read Only Memory). The memory 34 stores programs executed by the processor 32 and various materials generated during the processing. The storage 38 is, for example, a device including a recording medium such as a hard disk drive or a solid state drive. The storage 38 records various materials such as image data of a code generated by the processor 32. Furthermore, the image data of the code generated by the processor 32 can also be recorded in other storage (recording medium) outside the server computer 30. Such other storage is connected to the server computer 30 via a network (communication line). The communication circuit 36 is a circuit that communicates with other devices via a network. The communication circuit 36 can be connected to an external device by wire or wirelessly, or via a network such as the Internet or a LAN (Local Area Network). The communication circuit 36 can be connected to the printer, for example, via a LAN. Further, the communication circuit 36 can be connected to an information device such as a smart phone via a network such as the Internet. In addition to the components shown in FIG. 1, the server computer 30 may further include elements such as a power supply circuit, an input/output interface, and a display. However, the elements are not directly related to the operation of the embodiment, and thus the description thereof is omitted. Hereinafter, processing for generating a code image by the processor 32 of the present embodiment will be described. 2 is a flow chart showing the basic flow of processing of the code image by the processor 32. The processor 32 receives the instruction (code generation instruction) indicating that the code for a certain product should be generated, and then performs the operation shown in FIG. 2. In step S100, the processor 32 obtains information related to the product (for example, a product code, a manufacturing date, a batch number, a serial number, and the like). This information can be entered, for example, from the user or other device along with the code generation indication. In step S101, the processor 32 generates image data of the code according to the specific algorithm based on the acquired information. This image data can be produced, for example, in accordance with a known two-dimensional code generation algorithm. As an example, when the DataMatrix ECC200 which is one of the two-dimensional codes is used, the image data of the code can be generated by specifying the software of the algorithm according to the specification of ISO/IEC16022:2006. In the case of using other types of two-dimensional codes, it is also possible to generate image data of a code by using a software that specifies an algorithm according to the specification of the code. Some of such software have been disclosed, for example, on the Internet and can be utilized free of charge. Moreover, in the case of generating a code other than a two-dimensional code (e.g., a one-dimensional barcode or a code composed only of a string), the processor 32 generates image data in accordance with a particular algorithm used to generate the code. In step S102, the processor 32 changes (corrects) the image data of the code in accordance with a specific rule based on the information expressed by the code. In the present embodiment, the image data is changed by a method different from each of the product ID (identification), the batch number, or the serial number. For example, the processor 32 changes the image data by adding one or a plurality of marks (anti-counterfeit marks) to the determined position based on the serial number or the like in the image data. At this time, the processor 32 can also create information indicating the coordinate value indicating the position of the additional mark as the change material (security code), and record it in the memory 38 (recording medium) in association with the product. In consideration of dirt or defects, the security mark may be arranged in a plurality of positions in the code. Also, a plurality of overlapping methods can be used in combination. The security flag is placed at a position where the burden does not become large at the time of reading, and is placed at a position where the burden does not become large, depending on the error correction capability of the reading device (reader). The anti-counterfeiting mark is set to be smaller than the normal symbol mark and difficult to visually recognize, without damaging the true/false function. In step S104, the processor 32 instructs the printer to print the image data of the changed code on the article or its package. Thereby, an image of the code changed based on the specific rule is printed on the article or its package. Furthermore, the code image can also be printed on objects other than the package associated with the product (eg, signboards, advertisements, etc.). An example of a code image produced in the present embodiment will be described with reference to Figs. 3A to 3F. Fig. 3A is a view showing an example of a code image generated in step S101 of Fig. 2. Here, an example of using a DataMatrix code which is one of two-dimensional barcodes as a code will be described. Further, when a two-dimensional bar code other than the DataMatrix code, for example, a Quick Response (QR) code, a VeriCode, a PDF417 code, an Aztec code, or MaxiCode, is used, the same processing as that described below can be performed. The two-dimensional barcode usually includes a plurality of data units (hereinafter, simply referred to as "units") arranged in two dimensions. A plurality of cells have the shape of a square or rectangle of the same size. One of the plurality of cells is a bright (or white) unit and the other is a dim (or black) unit. One of the bright unit and the dim unit represents a 0 (zero) value, and the other represents a value of 1. Thus, the two-dimensional pattern of the light and dark of the elements represents the specific information expressed by the numerical rows 0 and 1. Fig. 3B is a view showing an example of a code image changed in step S102 of Fig. 2. In this example, a mark 1 (black dot) is added to the inside of the code area. The position (coordinate) of the additional mark 1 is determined based on the information represented by the code. For example, the marker 1 can be appended to the location that is uniquely determined by each serial number or batch number. Fig. 3C is a view showing another example of the changed code image. In this example, two markers 1 (black dots and white dots) are added inside the code region. As in this example, a plurality of markers 1 may be added. Among the plurality of cells constituting the two-dimensional code shown in the figure, black dots are added to the bright cells, and white dots are added to the dark cells. In this case, the change data includes information indicating the coordinate values of each of the two markers 1. Fig. 3D is a view showing still another example of the changed code image. In this example, three markers 1 (black dots and two white dots) are added inside the code region. In this case, the change data includes information indicating the coordinate values of each of the three markers 1. Furthermore, the number of the markers 1 may be four or more. The more the number of markers 1, the more changes can be achieved. Further, even in the case where a part of the mark cannot be recognized due to contamination or defects, the more the number of the marks 1 is, the more the possibility of authenticity determination can be improved. Fig. 3E is a view showing still another example of the changed code image. In this example, the mark 1 is a circle mark instead of a dot. Thus, the shape of the additional mark 1 may be a shape other than a dot. Fig. 3F is a view showing still another example of the changed code image. In this example, the mark 1 of the two circular symbols is added to the area of the code. In a plurality of units constituting the two-dimensional code, a black circle is added to the bright unit, and a white circle is added to the dark unit. In the example of Fig. 3F, three or more markers 1 may be added. The mark may be, for example, a symbol such as a triangle, a quadrangle, or a star mark, or a character. In the case where a plurality of marks are attached, the shapes may be different depending on the marks. In this case, the change data may also contain information on the shape of each mark. In the above example, the mark 1 is added to the code, but one or more marks 1 may be added to the outside of the code or to the outside. 4A to 4C show such an example. Fig. 4A shows an example in which a specific portion of the alignment pattern of the code (the thick line of the L-shaped outer circumference of the code) is made hollow. In this example, the white mark 1 is attached to the three portions on the alignment pattern. In this manner, one or more of the marks 1 may be added to the alignment pattern. Fig. 4B shows an example in which three marks 1 (black dots) are added around the alignment pattern. The markers 1 are contiguous with the alignment pattern. Fig. 4C shows an example in which three marks 1 (black dots) are added separately from the periphery of the alignment pattern. As in the case, the printing position of the mark 1 may be the outer side of the code area. In the above example, the parameter for changing the content of the code image (the element for changing the data) may be the number of marks, the shape of each mark, and the coordinate value (X coordinate and Y coordinate) in the image of each mark. ). The processor 32 determines the parameters according to specific rules based on information such as the serial number or batch number included in the information represented by the code. Then, one or more of the markers 1 and the code are superimposed in accordance with the determined parameters. Thereby, for example, the code can be printed in a different manner in each serial number or batch number of the product. In the above example, the attached mark 1 is smaller than the size of each unit included in the code. Further, a mark 1 having a relatively small number (for example, less than 1/10) is added to the number of each of the bright unit and the dark unit. Therefore, there is no obstacle to the reading of the code after the mark 1 is given. The number of units (also referred to as data units) in the two-dimensional barcode is set to N, and the number of additional marks is set to n. N varies depending on the type of the code, and may be, for example, an integer of 20 or more. The number n of the marks is an integer of 1 or more and N or less, and in one example, 2≦n≦N/10. In the case where n marks are attached, the change data for the change contents of the prescribed code contains information indicating n coordinate values in the image data. The processor determines n coordinate values based on the information represented by the code, and adds n marks to the position indicated by the n coordinate values. The combination of the n coordinate values differs depending on the information represented by the code (hereinafter, sometimes referred to as "original information"). The combinations of the coordinates of the markers correspond, for example, one-to-one with the original information. The authenticity of the code can be determined by determining whether the combination of the coordinates of the markers matches the original information read from the code. In addition to the above examples, it is also possible to add a change of the character mark including the string around the area of the two-dimensional code. The same security can be obtained by making the position, angle, font (including size, font, character spacing) of the character mark, and at least one of the contents of the string different in each item or each item group. effect. Fig. 5A shows an example of a code image to which a character mark 2 is added around the area of the code. In this example, a string containing numbers, letters, and tokens is appended to the top of the code. Fig. 5B is a view showing another example of the code image after the change of the character mark 2 is added around the area of the code. In this example, the character mark 2 has a different content, position, and size as compared with the example shown in FIG. 5A, and is inclined in the clockwise direction. In this manner, the processor 32 can also change the position (coordinate), rotation angle, font, and the like of the character mark 2 based on the information indicated by the code. In this case, the parameter (change data) specifying the content of the change includes the content of the string, the position (coordinate), and the information of the font. These parameters may be uniquely determined, for example, by each serial number or each batch number represented by the code. In addition to the above examples, the changing methods shown in FIGS. 3A to 3F, FIGS. 4A to 4C, and FIGS. 5A and 5B may be combined. For example, one or more of the marks 1 may be added to at least a part of the inside of the two-dimensional code, the alignment pattern, and the outside, and one or more character marks 2 may be added outside the two-dimensional code. In this form, the change data may include information such as the shape, coordinates, size, and content, coordinates, rotation angle, and font of each character mark 2. The processor 32 records its data in association with its code or item and records it on the recording medium. This information can be used for the authenticity determination process described below. Next, an example of changing the image data of the code in a different method from the method of attaching the mark will be described with reference to Figs. 6A to 6D. In the following example, in addition to the two-dimensional bar code, the code also contains human readable characters. The processor 32 changes the image data by changing the position of the barcode or human readable character within the image data. The relative position of the bar code to the human readable character is varied by this action. The direction and magnitude of the change is determined by the information represented by the bar code. In this example, the change data includes information indicating the amount of displacement from at least one of the bar code and the human readable character from the reference position in the image data. Fig. 6A shows an example of a code image before the change. In this example, a human readable character composed of four columns of characters is printed in the lateral direction of the two-dimensional barcode. The human readable character sequentially indicates (01) the item code, (21) the serial number, (10) the batch number, and (17) the expiration date from the top. This is the same as the information represented by the 2D barcode. There are various display modes of human readable characters, and are not limited to the illustrated aspects. Based on the typesetting shown in FIG. 6A, the processor 32 changes the relative positional relationship between the bar code and the human readable character according to the information represented by the bar code. For example, the printing position of a human readable character is changed in a different aspect of each serial number or each batch number. Figure 6B shows that the human readable character is shifted by only 0 in the upward direction (+Y direction). A change of 5 mm. Figure 6C shows that the human readable character is shifted by only 0 in the left direction (-X direction). A change of 5 mm. Figure 6D shows that the human readable character is shifted by only 0 in the downward direction (-Y direction). A variation of 5 mm and a deviation of 1 mm in the right direction (+X direction). Figure 6B to Figure 6D "Visual characters: Y + 0. The description of 5 mm" and the like is shown for convenience of explanation, and is not actually printed. The same is true in the figures below. The rectangular frame in Figures 6B to 6D is actually either printable or non-printable. As shown in these examples, the determination of authenticity can be made by changing the relative position of the bar code to the human readable character in accordance with a particular rule based on the information represented by the bar code. In this case, the change data includes information on the displacement amount from the reference position of each of the X direction and the Y direction. Processor 32 determines the amount of displacement in each direction in accordance with a particular rule. The position of the barcode can also be offset in the same way in place of human readable characters. Also, both the barcode and the human readable character can be offset from their respective reference positions. In the latter case, the number of parameters for changing the data (anti-counterfeiting code) is increased, so that more changes can be made. In addition to changing the relative position of the bar code to the human readable character, the processor 32 may also add a tag (e.g., a token, a graphic, a character, or a string) to the inside or outside of the bar code as in the previous example. Hereinafter, this example will be described. 7A to 7E show several examples in which the printing position of the human readable character is changed in accordance with the information indicated by the bar code, and the mark (in this example, a dot) is added around the bar code. Figure 7A shows an example where both human readable characters and points are located at a reference position. Figure 7B shows that the human readable character is offset from its reference position upward by 0. 5 mm, the point where the point is offset by 5 mm from the reference position. Figure 7C shows that the human readable character is offset from its reference position by 0. 5 mm and offset to the right by 0. 5 mm, the point is offset from the reference position by 8 mm in the upward direction and 5 mm in the left direction. Figure 7D shows that the human readable character is offset upward by 0 relative to its reference position. 5 mm and offset to the right by 0. 5 mm, the point is offset by 5 mm from the reference position and 10 mm to the left. Figure 7E shows that the human readable character is offset 1 mm in the downward direction relative to its reference position and offset 0 in the right direction. 5 mm, the point is offset by 2 mm from the reference position and 5 mm to the left. As in these examples, the relative position of the code to the human readable character and the position of the point (mark) are varied according to the information represented by the barcode, thereby enabling a more varied change. In these examples, the number of indicia may be singular or plural. In order to improve the possibility of authenticity determination when a part of the mark is not recognized due to dirt or defects, the number of marks (for example, three or more) may be increased. 8A to 8C are views showing another example of the embodiment. In these examples, the code contains only two-dimensional barcodes. The processor 32 causes the print position of the bar code to vary according to the particular rules based on the information shown by the bar code. Fig. 8A shows a code image before the change. The code image in this example contains a box of rectangles surrounding the area of the bar code. Processor 32 causes the relative positional relationship of the frame to the area of the bar code to vary according to the information shown in the bar code. Figure 8B shows that the bar code is offset from the reference position to the left by 0. 2 mm and offset upwards by 0. 2 mm case. Figure 8C shows that the bar code is offset from the reference position to the right by 0. 2 mm and offset downwards 0. 2 mm case. In these examples, the change data includes information indicating the amount of displacement of the reference position in the image data from the X direction and the Y direction. The processor 32 changes the image data by changing the position of the barcode within the image data based on the data for change. In each of the above examples, it is mainly assumed that a two-dimensional barcode (matrix code) is attached to an article. However, the present disclosure is not limited to such an example. The technique in the present embodiment can be similarly used when the code is a one-dimensional code or a code of a string or a combination of the above. 9A to 9C are views showing another example of the embodiment. In these examples, the code does not contain a bar code and only contains human readable characters. Processor 32 causes the print position of the human readable character to vary according to the particular rules based on the information shown in the human readable character. Fig. 9A shows the code image before the change. The code image in this example contains a box of rectangles surrounding the area of the human readable character. Processor 32 causes the relative positional relationship of the box to the region of the human readable character to vary based on the information represented by the human readable character. Figure 9B shows that the human readable character is offset from the reference position to the left by 0. 2 mm and offset upwards by 0. 2 mm case. Figure 9C shows that the human readable character is offset from the reference position to the right by 0. 2 mm and offset downwards 0. 1 mm case. In these examples, the change data includes information indicating the amount of displacement of the human readable character from the reference position in the image data to each of the X and Y directions. The processor 32 changes the image data by changing the position of the human readable character within the image data based on the change data. In the above example, the position of the code (bar code or human readable character) may be changed, or the rotation angle of the code may be changed. In the form of printing human readable characters, the fonts (size, font, character spacing, etc.) of human readable characters may also be changed for each item or group of items. A variety of changes can be made by combining such methods. The image data of the code produced by the above method can be read in the order in which the normal two-dimensional barcode is read. At this time, the additional anti-counterfeit mark or the like is regarded as dirty or defective, and error correction is performed. Therefore, the reading is normally performed in the same manner as the barcode for which the change for the anti-counterfeiting is not performed. Therefore, the application in the previous system will not be damaged. Secondly, the processing of changing the code image according to a specific rule will be more specifically described. Fig. 10A is a flow chart showing a more specific example of the process of changing the code image (step S102 in Fig. 2). Here, an example in which one or a plurality of dot marks are added to the inside or outside of the code region as an example will be described. In this example, the processor 32 determines the value representing the data, that is, the hash value, from the data (original information) of the code generated in step S101 in Fig. 2 (step S220). The hash value is a clear indication of the value of the content of the original information, and generally has a smaller amount of information than the original information. The processor 32 calculates the hash value using a hash function (e.g., an encrypted hash function) for obtaining a hash value from the original information. If the purpose of this embodiment of anti-counterfeiting is considered, the hash function is preferably designed to produce a hash value that is difficult to infer from the original code. Next, the processor 32 performs conversion from the calculated hash value to the print information (change data). The processor 32 refers to the code table (lookup table) prepared in advance, and determines the change data (the coordinate value of each dot mark in this example) (step S221). The table can be produced, for example, in such a manner as to satisfy the following conditions. The number of defects is a specific quantity or a quantity within a specific range. For example, three, four, four or less, and other unobtrusive point markers are added. The density of the defect mark is below a certain value. That is, it is avoided that a plurality of dot marks are added to the adjacent positions, making it difficult to stand out. For example, only one tag is attached to the area of 5 x 5 cells. When the point mark is internally configured in the code, the reading burden of the original code is reduced. That is, it does not hinder the reading of a normal reader without the anti-counterfeiting function. The Hamming distance between the dot patterns is a fixed distance or more. That is to avoid a similar configuration. Thereby, a repairable mechanism can be made even in the case where one of the dot marks is partially defective. A table that satisfies the above conditions is prepared in advance and stored in a recording medium such as a memory. The processor 32 refers to the table and determines the position (coordinate) of each point from the hash value. The processor 32 generates the changed code image by arranging the dot markers on the determined coordinates (step S222). Fig. 10B is a diagram schematically showing the flow from the original information to the generation of the change data. As described above, the processor 32 uses the hash function to calculate a hash value with a smaller amount of information from the original information having a relatively large amount of information. Second, the reference code table (table) determines the change data (such as the combination of coordinate values) from the hash value. Then, the image data of the code is changed based on the changed data for the decision. According to such an action, the authenticity determination can be performed via a hash value in which the amount of information is relatively small. Therefore, the amount of calculation required for the determination can be suppressed. Fig. 10C is a diagram showing an example of a model representation table. This table specifies the correspondence between the hash value and the combination of a plurality of coordinate values of the configuration code (change data). The combination of the hash value and the coordinate value corresponds one-to-one. Therefore, the self-healing value uniquely determines the change data. Conversely, the hash value can be uniquely determined by changing the data. As described below, it is possible to easily determine whether or not the code is forged by this mechanism. Changing the typeface or symbol typesetting without adding the mark to the code image can also be accomplished by the same process. In this case, a table such as that shown in Fig. 10D is prepared in advance and recorded instead of the table shown in Fig. 10C. The table can be designed, for example, in such a manner as to satisfy the following conditions. Changes in ∙ typesetting can be identified by visual or mechanical reading and are not conspicuous. For example, for each of the ±X direction and the ±Y direction, 0 to 2. The value in the range of 5 mm is 0. The 5 mm scale is set to the amount of change. ∙ Make the change of the layout pattern not become orderly. That is, it is difficult to infer a layout pattern from information such as a serial number. ∙ Make the layout patterns equally distributed. That is, there is no case where the frequency is placed at a specific portion with a high frequency. The processor 32 can refer to a table prepared in such a manner as to satisfy the above conditions, determine the displacement amount of human readable characters, and the like, and produce printed materials. Substantially the same processing is performed when a change string or a symbol is typed and a change of one or more marks is added to the inside or outside of the code. In this case, for example, the table shown in Fig. 10E can be utilized. In the table of this example, the information for the change includes information on the coordinate value of each of the attached marks and the amount of movement of the moving object (for example, a string or a symbol). The processor 32 refers to such a table, attaches the mark to the original code image, and changes the typesetting of the human readable character or the like. The rotation of the symbol or string, or the change of the font of the string can also be achieved by the same processing. Also in this case, a table similar to the one shown in Figs. 10C and 10D is prepared in advance. The processor 32 refers to the table, and creates a change data (for example, a rotation angle, a character size, a font of a character, a character interval, and the like) according to the hash value, and changes the original code image and records it. The table may be produced, for example, in such a manner as to satisfy the following conditions. ∙ Make the changing situation not orderly. That is, it is difficult to infer a layout pattern based on information such as a serial number. ∙ Make the changes are equally distributed. That is, there is no case where a particular variation is presented at a higher frequency. ∙ Make the changes are not similar to each other. That is, it is easy to infer an accurate pattern even in the case of contamination or defects. In the example shown in FIGS. 10A to 10E, the processor uses the hash function to calculate the hash value from the original information indicated by the code, and based on the hash value, the reference table (code table) determines the change data (security code). However, such processing is only an example. The processor may, for example, directly determine the content of the change using a specific function or table or the like based on the original information represented by the code. The method of changing the content according to the specific rules according to the specific information is not limited to the specific method. <Temperance Determination System> Next, an example of a system (authenticity determination system) for determining whether or not the barcode attached to the article is genuine is explained. An information machine (reading device) such as a smart phone or a tablet computer can be used to determine whether the barcode attached to the article is the same as the barcode attached to the genuine product. In order to perform this determination, the application software (application) for determination is installed in advance on the reading device. The method of authenticity determination of the present disclosure is roughly divided into the following two methods. (1) The same or corresponding data as the security code (change data) for which the specific rule is applied at the time of printing of the code image is recorded in advance in the reading device, and the reading device alone performs true without communication. Pseudo-decision. (2) The reading device does not have the information relating to the security code indicating the specific rule applicable at the time of printing, and the reading device queries the server or the recording device via the communication line. The server performs the determination of authenticity and returns the determination result to the reading device. The authenticity determination system of the present embodiment can be realized by any of the above methods (1) and (2). The method of (1) can be realized simply, and therefore has the advantage of easy system construction. In the method of (2), since the reading device does not have the data indicating the rule of authenticity determination, even if the reading device is analyzed, there is no advantage that the rule leaks and has a safety advantage. Further, in the method of (2), adjustment of the update determination rule or the like may be performed as needed, so that the safety strength can be maintained high. Therefore, when it is important to construct a system with a low cost and a simple structure, it is preferable to adopt the method of (1). On the other hand, when it is important to improve the safety strength, it is preferable to adopt the method of (2). Hereinafter, an example of the authenticity determination system to which the method of (2) is applied will be described first, and an example of the authenticity determination system to which the method of (1) is applied will be described. Fig. 11 is a view schematically showing an example of the overall configuration of the authenticity determination system to which the method of the above (2) is applied. This system includes components such as a server computer 30 (hereinafter simply referred to as "server 30"), a printer 40, a memory 50, and a smart phone 10. The server 30 generates image data (changed image data) attached to the code of the article 5 by any of the above methods, and stores it in the storage 50. The printer 40 prints the code on the article 5 or its package based on the image data. The printed goods 5 are handed over to the consumer through the circulation process. The consumer can use the smart phone 10 to determine whether the product 5 is genuine. For this purpose, an application software (application) for authenticity determination is pre-installed in the smart phone 10. Fig. 12 is a block diagram showing a schematic configuration of a smartphone 10 (reading device). The smart phone 10 includes a processor 12, a memory 14, a communication circuit 16, a camera 18, and a display 20. The processor 12 performs the following actions by executing a computer program (application) stored in the memory 14. In the present embodiment, the image data captured by the camera 18 is sent to the remote server 30 via the communication circuit 16. Fig. 13 is a flow chart showing an example of the authenticity determining operation. When the authenticity determination is made, the processor 12 executes an application (program) for authenticity determination according to the operation of the consumer (user). The processor 12 causes an image of the portion of the article 5 attached to the barcode printed by the camera 18 of the smart phone 10 to be displayed on the display 20. After the consumer photographs the part (step S10), the communication circuit 16 transmits the image data to the server 30 via the base station 90 and the network 100 (e.g., the Internet) (step S11). The server 30 determines whether or not the bar code included in the transmitted image data is a genuine bar code based on the change data stored in the storage 50 (step S13). The server 30 transmits the data indicating the determination result to the smartphone 10 via the network 100 and the base station 90 (step S14). The processor 12 of the smartphone 10 displays the determination result on the display 20 (step S15). Thereby, the consumer can confirm whether the barcode attached to the product 5 is a regular barcode. Fig. 14 is a flow chart showing more specifically the determination processing of the authenticity of step S13. The processor 32 of the server 30 determines the item to which the code is attached based on the code included in the image data to be delivered (step S200). For example, the information such as the product code, the batch number, and the serial number indicated by the code is read to determine the item. This reading can be performed, for example, by a known algorithm for reading a two-dimensional code. Next, the recording medium used for printing the code on the article is acquired from the recording medium such as the storage device 50 (step S201). The change information obtained here can be, for example, the data contained in the tables illustrated in FIGS. 10C to 10E. The processor 32 determines whether or not the change indicated by the change data has been reflected in the image data (hereinafter, referred to as "photographing data") (step S202). This determination can be performed, for example, based on whether or not the change content corresponding to the hash value calculated based on the code included in the photographed material matches the change content of the photographed material (for example, the combination of the position of the attached mark, and/or typesetting). In the case where the code image is a forgery, the two do not match. Therefore, it can be judged that the product to which the code image is attached is not genuine. The determination can also be performed using well-known image matching techniques. When it is determined that the code included in the transmitted image data is a regular code, the processor 32 transmits the information of the subject to the smart phone 10. When it is determined that the code included in the transmitted image data is not a regular code, the processor 32 transmits the information of the subject to the smart phone 10. Furthermore, the processor 32 can also use the changed image data used for printing to determine the authenticity instead of determining the authenticity based on the changed data. That is, the processor 32 can also determine the identity by comparing the transmitted image data with the image data used for printing. In this case, for example, the identity of the two images can be determined using a well-known image matching technique. In the present embodiment, the code image generation and authenticity determination are performed by the same server 30. However, different devices may perform these operations. It is also possible to arrange a system for generating and printing a code image and a device or system for performing authenticity determination at a distance. 15A and 15B are views showing a display example of the determination result. Fig. 15A shows an example of display when it is determined that the captured code matches the code of the regular product. In this case, the display 20 can display the phrase that the captured code matches the code of the regular product, for example, the phrase "the code of the regular product". Fig. 15B shows an example of display when it is determined that the captured code does not match the code of the genuine product. In this case, the main purpose of the captured code and the code of the regular product, for example, the phrase "code of the non-formal product" can be displayed on the display 20. At this time, as shown in FIG. 15B, the following mechanism may also be introduced, that is, display of a button such as "contact manufacturer", and tapping the display, thereby displaying the contact address information of the manufacturer, or by e-mail Wait for the manufacturer. In the present embodiment, the server 30 on the cloud determines the authenticity of the image of the code being read. The smart phone 10 (reading device) transmits only the captured data to the server 30, and receives and displays the data indicating the determination result from the server 30. Therefore, even if the internal data of the reading device is analyzed, the rule for the change of the code image cannot be determined. Due to the irregular leakage, it ensures a high level of safety. Next, an example in which the reading device such as the smart phone 10 performs the determination of its authenticity and not the server 30 performs the determination of its own authenticity will be described (an example of the above (2)). Fig. 16 is a view schematically showing the authenticity determination system in this example. In this example, the authenticity determination system only includes the smart phone 10. The processor 12 of the smart phone 10 performs the same determination process as described above by executing a computer program stored in the memory 14 without passing through a communication line. In addition to the program for authenticity determination, the memory 14 of the smartphone 10 also records in advance the data indicating the specific rules applicable to the production of the code image. Fig. 17 is a flowchart showing an example of the authenticity determination processing of the smartphone 10. The smart phone 10 captures a code attached to the product by the camera 18 in accordance with an instruction from the user (step S300). After the photographing code, the processor 12 determines the article from the code included in the photographing material (step S301). For example, the item is determined based on information such as the item code, the batch number, and the serial number indicated by the code. This reading can be performed, for example, by a known algorithm for reading a two-dimensional code. Next, the processor 12 accesses the memory 14 (or other recording medium) and acquires the changed material for the identified item (step S302). The processor 12 determines whether or not the change indicated by the change data has been reflected in the photographed data based on the photographed data and the change data (step S303). This determination can be made, for example, based on whether or not the change content corresponding to the hash value calculated from the code included in the photographed material matches the change content of the photographed material (for example, the combination of the position of the attached mark, and/or typesetting). The determination can also be performed using well-known image matching techniques. When it is determined that the code included in the captured data is a regular code, the processor 12 displays the information of the subject on the display 20. When it is determined that the code included in the captured data is not a regular code, the processor 12 transmits the information of the subject to the display 20. The processor 12 can also determine the authenticity by using the changed image data used in printing instead of determining the authenticity based on the changed data. That is, the processor 12 can also determine the identity by comparing the photographed data with the image data used in the printing. In this case, for example, the identity of the two images can be determined using a well-known image matching technique. In this example, the smart phone 10 can determine the authenticity of the item separately without going through the network. Therefore, compared with the example of Fig. 11, the constitution of the system can be made simple. As described above, the authenticity determination method of the present embodiment includes the steps of: acquiring image data (first image data) obtained by capturing a code printed on an article; and obtaining image data after the actual use of the changed image from the recording medium. (2nd image data); determining whether the code in the first image data is a normal code by comparing the first image data with the second image data (or the change data); and outputting the determination result Information. Thereby, the authenticity of the code can be easily determined. In the above example, the reading device is a smart phone, but may be another information device. For example, a tablet, a barcode reader, a notebook PC (laptop PC), or the like can also be used as the reading device. The camera (or imaging element) and the display in the reading device may not be housed in the same housing as the processor and the memory. The above technique can be equally applied to the case where the object of the authenticity determination is a code other than the two-dimensional code (for example, a one-dimensional barcode or a human-readable character). Industrial Applicability The method and apparatus for generating a code image according to an embodiment of the present disclosure can be used for printing a one-dimensional or two-dimensional bar code or a human readable character or the like on an article such as an article of manufacture.

1‧‧‧標記1‧‧‧ mark

2‧‧‧字元標記2‧‧‧ character mark

5‧‧‧商品5‧‧‧ Goods

10‧‧‧智慧型手機10‧‧‧Smart mobile phone

12‧‧‧處理器12‧‧‧ Processor

14‧‧‧記憶體14‧‧‧ memory

16‧‧‧通訊電路16‧‧‧Communication circuit

18‧‧‧相機18‧‧‧ camera

20‧‧‧顯示器20‧‧‧ display

30‧‧‧伺服器電腦30‧‧‧Server computer

32‧‧‧處理器32‧‧‧ processor

34‧‧‧記憶體34‧‧‧ memory

36‧‧‧通訊電路36‧‧‧Communication circuit

38‧‧‧儲存器38‧‧‧Storage

40‧‧‧印表機40‧‧‧Printer

50‧‧‧儲存器50‧‧‧Storage

90‧‧‧基站90‧‧‧ base station

100‧‧‧網路100‧‧‧Network

S10‧‧‧步驟S10‧‧‧ steps

S11‧‧‧步驟S11‧‧ steps

S12‧‧‧步驟Step S12‧‧‧

S13‧‧‧步驟S13‧‧‧ steps

S14‧‧‧步驟S14‧‧‧ steps

S15‧‧‧步驟S15‧‧‧ steps

S100‧‧‧步驟S100‧‧‧ steps

S101‧‧‧步驟S101‧‧‧Steps

S102‧‧‧步驟S102‧‧‧Steps

S103‧‧‧步驟S103‧‧‧Steps

S104‧‧‧步驟S104‧‧‧Steps

S200‧‧‧步驟S200‧‧‧ steps

S201‧‧‧步驟S201‧‧‧ steps

S201‧‧‧步驟S201‧‧‧ steps

S220‧‧‧步驟S220‧‧‧Steps

S221‧‧‧步驟S221‧‧ steps

S222‧‧‧步驟S222‧‧‧Steps

S300‧‧‧步驟S300‧‧‧ steps

S301‧‧‧步驟S301‧‧‧Steps

S302‧‧‧步驟S302‧‧‧Steps

S303‧‧‧步驟S303‧‧‧Steps

S304‧‧‧步驟S304‧‧‧Steps

圖1係表示實施形態1之碼圖像產生裝置(伺服器電腦30)之概略構成之方塊圖。 圖2係表示處理器32對碼圖像之產生處理之基本流程之流程圖。 圖3A係表示圖2之步驟S101中產生之碼圖像之一例之圖。 圖3B係表示圖2之步驟S102中被改變之碼圖像之一例之圖。 圖3C係表示改變後之碼圖像之另一例之圖。 圖3D係表示改變後之碼圖像之進而另一例之圖。 圖3E係表示改變後之碼圖像之進而另一例之圖。 圖3F係表示改變後之碼圖像之進而另一例之圖。 圖4A表示將碼之對準圖案中之特定之部位設為中空之例。 圖4B表示於對準圖案之周圍附加有3個標記1(黑點)之例。 圖4C表示於對準圖案之周圍分離地附加有3個標記1(黑點)之例。 圖5A表示於碼之區域之周圍附加有字元標記2之碼圖像之一例。 圖5B係表示於碼之區域之周圍附加有字元標記2之改變後之碼圖像之另一例之圖。 圖6A表示被改變前之碼圖像之例。 圖6B係表示使人類可讀字元朝上方向(+Y方向)僅偏移0.5 mm之改變例。 圖6C表示使人類可讀字元朝左方向(-X方向)僅偏移0.5 mm之改變例。 圖6D表示使人類可讀字元朝下方向(-Y方向)僅偏移0.5 mm且朝右方向(+X方向)僅偏移1 mm之改變例。 圖7A表示人類可讀字元及點之兩者位於基準位置之例。 圖7B表示人類可讀字元自其基準位置朝上方向偏移0.5 mm、及點自其基準位置朝上方向偏移5 mm之例。 圖7C係表示人類可讀字元自其基準位置朝下方向偏移0.5 mm且朝右方向偏移0.5 mm、及點自其基準位置朝上方向偏移8 mm且朝左方向偏移5 mm之例。 圖7D表示類可讀字元自其基準位置朝上方向偏移0.5 mm且朝右方向偏移0.5 mm、及點自其基準位置朝上方向偏移5 mm且朝左方向偏移10 mm之例。 圖7E表示人類可讀字元自其基準位置朝下方向偏移1 mm且朝右方向偏移0.5 mm、及點自其基準位置朝下方向偏移2 mm且朝左方向偏移5 mm之例。 圖8A係表示改變前之碼圖像之另一例之圖。 圖8B表示條碼自基準位置朝左偏移0.2 mm且朝上偏移0.2 mm之例。 圖8C表示條碼自基準位置朝右偏移0.2 mm且朝下偏移0.2 mm之例。 圖9A係表示改變前之碼圖像之另一例之圖。 圖9B表示人類可讀字元自基準位置朝左偏移0.2 mm且朝上偏移0.2 mm之例。 圖9C表示人類可讀字元自基準位置朝右偏移0.2 mm且朝下偏移0.1 mm之例。 圖10A係表示改變碼圖像之處理(圖2之步驟S102)之更具體之例之流程圖。 圖10B係模式性表示自原資訊至產生改變用資料為止之流程之例之圖。 圖10C係模式性表示規定雜湊值與改變用資料之對應關係之表之一例之圖。 圖10D係模式性表示規定雜湊值與改變用資料之對應關係之表之一例之圖。 圖10E係模式性表示規定雜湊值與改變用資料之對應關係之表之一例之圖。 圖11係模式性表示真偽判定系統之整體構成之例之圖。 圖12係表示智慧型手機10(讀取裝置)之概略構成之方塊圖。 圖13係表示真偽判定動作之一例之流程圖。 圖14係更具體地表示圖13之步驟S13中之真偽判定處理之流程圖。 圖15A係表示判定被拍攝之碼與正規品之碼一致之情形時之顯示例之圖。 圖15B係表示判定被拍攝之碼與正規品之碼不一致之情形時之顯示例之圖。 圖16係模式性表示真偽判定系統之另一例之圖。 圖17係表示讀取裝置對真偽判定之處理之例之流程圖。Fig. 1 is a block diagram showing a schematic configuration of a code image generating device (server computer 30) according to the first embodiment. 2 is a flow chart showing the basic flow of processing of the code image by the processor 32. Fig. 3A is a view showing an example of a code image generated in step S101 of Fig. 2. Fig. 3B is a view showing an example of a code image changed in step S102 of Fig. 2. Fig. 3C is a view showing another example of the changed code image. Fig. 3D is a view showing still another example of the changed code image. Fig. 3E is a view showing still another example of the changed code image. Fig. 3F is a view showing still another example of the changed code image. Fig. 4A shows an example in which a specific portion of the alignment pattern of the code is made hollow. Fig. 4B shows an example in which three marks 1 (black dots) are added around the alignment pattern. Fig. 4C shows an example in which three marks 1 (black dots) are separately provided around the alignment pattern. Fig. 5A shows an example of a code image to which a character mark 2 is added around the area of the code. Fig. 5B is a view showing another example of the code image after the change of the character mark 2 is added around the area of the code. Fig. 6A shows an example of a code image before being changed. Fig. 6B shows an example of a change in which the human readable character is shifted by 0.5 mm in the upward direction (+Y direction). Fig. 6C shows an example of a change in which the human readable character is shifted by 0.5 mm in the left direction (-X direction). Fig. 6D shows a modification in which the human readable character is shifted by only 0.5 mm in the downward direction (-Y direction) and shifted by only 1 mm in the right direction (+X direction). Figure 7A shows an example where both human readable characters and points are located at a reference position. Fig. 7B shows an example in which the human readable character is shifted by 0.5 mm from the reference position in the upward direction and 5 mm from the reference position in the upward direction. Figure 7C shows that the human readable character is offset 0.5 mm from its reference position and 0.5 mm to the right, and the point is offset 8 mm from its reference position and 5 mm to the left. An example. Figure 7D shows that the readable character is offset from its reference position by 0.5 mm in the upward direction and by 0.5 mm in the right direction, and the point is offset from the reference position by 5 mm in the upward direction and by 10 mm in the left direction. example. Figure 7E shows that the human readable character is offset 1 mm downward from its reference position and offset by 0.5 mm in the right direction, and the point is offset 2 mm downward from its reference position and 5 mm in the leftward direction. example. Fig. 8A is a view showing another example of the code image before the change. Fig. 8B shows an example in which the bar code is shifted to the left by 0.2 mm from the reference position and offset upward by 0.2 mm. Fig. 8C shows an example in which the bar code is shifted to the right by 0.2 mm from the reference position and downward by 0.2 mm. Fig. 9A is a view showing another example of the code image before the change. Fig. 9B shows an example in which the human readable character is shifted to the left by 0.2 mm from the reference position and offset upward by 0.2 mm. Fig. 9C shows an example in which the human readable character is offset from the reference position by 0.2 mm to the right and downward by 0.1 mm. Fig. 10A is a flow chart showing a more specific example of the process of changing the code image (step S102 of Fig. 2). Fig. 10B is a view schematically showing an example of a flow from the original information to the generation of the change data. Fig. 10C is a view schematically showing an example of a table defining the correspondence relationship between the hash value and the change data. Fig. 10D is a view schematically showing an example of a table defining a correspondence relationship between a hash value and a change data. Fig. 10E is a view schematically showing an example of a table defining a correspondence relationship between a hash value and a change data. Fig. 11 is a view schematically showing an example of the overall configuration of the authenticity determination system. Fig. 12 is a block diagram showing a schematic configuration of a smartphone 10 (reading device). Fig. 13 is a flow chart showing an example of the authenticity determining operation. Fig. 14 is a flow chart showing more specifically the authenticity determination processing in step S13 of Fig. 13. Fig. 15A is a view showing a display example when it is determined that the code to be photographed coincides with the code of the regular product. Fig. 15B is a view showing a display example when it is determined that the code to be captured does not match the code of the regular product. Fig. 16 is a view schematically showing another example of the authenticity determination system. Fig. 17 is a flow chart showing an example of processing of the authenticity determination by the reading device.

Claims (14)

一種方法,其係藉由處理器而產生表示與物品建立關聯之資訊之一維或二維之碼之圖像資料者,且包含以下步驟: 基於所輸入之上述資訊,決定表示上述資訊之一維或二維之碼; 產生表示於已決定之上述碼之區域之外側附加有至少1個標記之圖像之改變圖像資料;及 將上述改變圖像資料記錄於記錄媒體; 產生上述改變圖像資料之步驟包含: 基於與上述物品建立關聯之資訊,決定上述碼之區域之外側之1個以上之座標值;及 於已決定之上述1個以上之座標值所示之位置,附加至少1個標記; 上述至少1個標記之座標值係依每一物品或每一物品群而變更。A method for generating image data representing a one-dimensional or two-dimensional code of information associated with an item by a processor, and comprising the steps of: determining one of the information based on the input information a dimensional or two-dimensional code; generating changed image data indicating an image of at least one mark attached to an outer side of the determined area of the code; and recording the changed image data on the recording medium; generating the change map The step of the image data includes: determining one or more coordinate values outside the area of the code based on the information associated with the item; and adding at least 1 to the position indicated by the determined one or more coordinate values The mark of each of the at least one mark is changed for each item or group of articles. 如請求項1之方法,其中產生上述改變圖像資料之步驟包含: 基於與上述物品建立關聯之資訊,決定上述碼之區域之外側之複數個座標值, 於已決定之上述複數個座標值所示之位置,附加複數個標記; 上述複數個標記之座標值之組合係依每一物品或每一物品群而變更。The method of claim 1, wherein the step of generating the changed image data comprises: determining a plurality of coordinate values outside the region of the code based on the information associated with the article, and determining the plurality of coordinate values At the position shown, a plurality of markers are added; the combination of the coordinate values of the plurality of markers is changed for each item or group of articles. 如請求項1或2之方法,其中上述至少1個標記之個數或形狀係基於上述碼所表示之資訊而決定。The method of claim 1 or 2, wherein the number or shape of the at least one of the markers is determined based on information represented by the code. 如請求項1或2之方法,其中上述碼係包含複數個單元之二維條碼,且 上述至少1個標記之大小小於各單元之大小。The method of claim 1 or 2, wherein the code system comprises a two-dimensional bar code of a plurality of cells, and the size of the at least one tag is smaller than the size of each cell. 如請求項1或2之方法,其中產生上述改變圖像資料之步驟包含: 基於與上述物品建立關聯之資訊,決定於上述碼之區域之外側與上述區域相接之位置之1個以上之座標值, 於已決定之上述1個以上之座標值所示之位置,以不影響上述碼之讀取且複數個標記不鄰接之態樣附加至少1個標記。The method of claim 1 or 2, wherein the step of generating the image data for changing comprises: determining, based on the information associated with the item, one or more coordinates of a position on the outer side of the area of the code that is in contact with the area The value is at least one mark added to the position indicated by the one or more coordinate values determined above, without affecting the reading of the above code and the plurality of marks are not adjacent. 如請求項1或2之方法,其中上述碼於排列有上述複數個單元之區域之周圍具有對準圖案, 上述至少1個座標值係選自上述對準圖案上之區域。The method of claim 1 or 2, wherein the code has an alignment pattern around a region in which the plurality of cells are arranged, and the at least one coordinate value is selected from a region on the alignment pattern. 一種方法,其係藉由處理器而產生表示與物品建立關聯之資訊之碼之圖像資料者,且包含以下步驟: 基於所輸入之上述資訊,產生表示將表示上述資訊之碼之圖像以依每一物品或每一物品群而異之態樣加以改變之圖像之改變圖像資料;及 將上述改變圖像資料記錄於記錄媒體; 上述碼包含一維或二維之條碼及人類可讀字元, 產生上述改變圖像資料之步驟包含基於上述資訊,決定上述人類可讀字元之自上述圖像內之基準位置之位移量,使上述條碼與上述人類可讀字元之相對位置變化。A method for generating image data representing a code associated with an item by a processor, and comprising the steps of: generating an image representing a code representing the information based on the input information; Changing the image data of the image changed according to each item or each group of articles; and recording the changed image data on the recording medium; the code includes a one-dimensional or two-dimensional barcode and a human Reading the character, the step of generating the change image data includes determining, based on the information, a displacement amount of the reference position of the human readable character from the image, so that the barcode is opposite to the human readable character Variety. 2或7之方法,其更包含將上述改變圖像資料所示之圖像印刷於上述物品或其包裝上之步驟。The method of 2 or 7, further comprising the step of printing the image shown by said changing image data on said article or its packaging. 2或7之方法,其中產生上述改變圖像資料之步驟係由讀取裝置以可自上述改變圖像資料中讀取與改變前之上述圖像所示之資訊相同之資訊之態樣產生上述改變圖像資料。The method of 2 or 7, wherein the step of generating the above-mentioned image data change is performed by the reading device in such a manner that the same information as that indicated by the image before the change is read from the changed image data Change the image data. 2或7之方法,其中上述物品為製造物, 與上述物品建立關聯之上述資訊包含商品碼、製造年月日、消費期限、批次編號、及序號之至少1者, 產生上述改變圖像資料之步驟係以依每一上述商品碼、每一上述批次編號、或每一上述序號而異之態樣,改變上述圖像。The method of 2 or 7, wherein the item is a manufactured product, and the information related to the item includes at least one of a product code, a manufacturing date, a consumption period, a batch number, and a serial number, and the image data is generated. The steps are such that the image is changed in accordance with each of the above-described article codes, each of the above-mentioned batch numbers, or each of the above-mentioned serial numbers. 一種電腦程式產品,其係用以產生表示與物品建立關聯之資訊之碼之圖像資料者,且使處理器 執行如請求項1至10中任一項之方法。A computer program product for generating image data representing a code associated with an item, and causing a processor to perform the method of any one of claims 1 to 10. 一種裝置,其係產生表示與物品建立關聯之資訊之碼之圖像資料者,且具備: 處理器;及 記憶體,其儲存有由上述處理器執行之程式; 上述程式係使上述處理器 執行如請求項1至10中任一項之方法。An apparatus for generating image data representing a code associated with an item, and comprising: a processor; and a memory storing a program executed by the processor; the program causing the processor to execute The method of any one of claims 1 to 10. 一種真偽判定方法,其包含以下步驟: 取得拍攝印刷於物品上之碼而得之第1圖像資料; 自記錄媒體取得藉由如請求項1至10中任一項之方法產生之上述改變圖像資料即第2圖像資料、或規定上述第2圖像資料之改變內容之改變用資料; 基於上述第1圖像資料、與上述第2圖像資料或上述改變用資料,判定上述第1圖像資料中之上述碼是否為正規之碼;及 輸出表示判定結果之資料。A method for authenticity determination, comprising the steps of: obtaining a first image data obtained by capturing a code printed on an article; and obtaining the above-mentioned change by the method of any one of claims 1 to 10 from the recording medium The image data is a second image data or a data for changing the content of the change of the second image data; and the first image data, the second image data, or the change data is determined based on the image data. 1 Whether the above code in the image data is a regular code; and outputting information indicating the judgment result. 一種電腦程式產品,其使電腦執行以下步驟: 取得拍攝印刷於物品上之碼而得之第1圖像資料; 自記錄媒體取得藉由如請求項1至10中任一項之方法產生之上述改變圖像資料即第2圖像資料、或規定上述第2圖像資料之改變內容之改變用資料; 基於上述第1圖像資料、與上述第2圖像資料或上述改變用資料,判定上述第1圖像資料中之上述碼是否為正規之碼;及 輸出表示判定結果之資料。A computer program product, which causes a computer to perform the following steps: obtaining a first image data obtained by photographing a code printed on an article; and obtaining the above-mentioned method by the method of any one of claims 1 to 10 Changing the image data, that is, the second image data, or the data for changing the content of the change of the second image data; determining the above based on the first image data, the second image data, or the change data Whether the above code in the first image data is a regular code; and outputting information indicating the result of the determination.
TW107106180A 2017-02-23 2018-02-23 Method for generating image data of a code, and method for determining authenticity or false of the code TW201835816A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2017032058A JP6231233B1 (en) 2017-02-23 2017-02-23 Code image data generation method and code authenticity determination method
JP2017-032058 2017-02-23

Publications (1)

Publication Number Publication Date
TW201835816A true TW201835816A (en) 2018-10-01

Family

ID=60321108

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107106180A TW201835816A (en) 2017-02-23 2018-02-23 Method for generating image data of a code, and method for determining authenticity or false of the code

Country Status (3)

Country Link
JP (1) JP6231233B1 (en)
TW (1) TW201835816A (en)
WO (1) WO2018155148A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468546A (en) * 2020-07-14 2021-10-01 青岛海信电子产业控股股份有限公司 Image processing method and intelligent equipment

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019095953A (en) * 2017-11-21 2019-06-20 小林クリエイト株式会社 Two-dimensional code for preventing forgery of printed matter and printed matter having two-dimensional code
JP6473899B1 (en) 2017-12-29 2019-02-27 株式会社I・Pソリューションズ Composite code pattern, generating device, reading device, method and program
SG10201801042QA (en) * 2018-02-07 2019-09-27 I Sprint Innovations Pte Ltd Two-Dimensional Barcode Generating Method, Verification Method, Server and Two-Dimensional Barcode
JP2019196189A (en) * 2018-05-08 2019-11-14 凸版印刷株式会社 Package and implementation method of website campaign
CN114997350A (en) * 2022-06-15 2022-09-02 成都玩物有思数字营销策划有限公司 Method and system for identifying authenticity of article

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3193461B2 (en) * 1992-06-12 2001-07-30 沖電気工業株式会社 Ticketing system
JP2004021398A (en) * 2002-06-13 2004-01-22 Toyo Commun Equip Co Ltd Prepaid card
JP4255252B2 (en) * 2002-07-19 2009-04-15 大日本印刷株式会社 Authentication system, authentication method, authentication program, and paper medium
JP4585202B2 (en) * 2004-02-03 2010-11-24 アライ株式会社 Two-dimensional code, two-dimensional code forming apparatus and forming method, and two-dimensional code reading apparatus and reading method
JP4491285B2 (en) * 2004-06-11 2010-06-30 アライ株式会社 Information verification system and information verification method using two-dimensional code
JP4691346B2 (en) * 2004-10-08 2011-06-01 株式会社エルイーテック Semiconductor device for gaming machine control, and inspection apparatus and inspection method therefor
JP4746338B2 (en) * 2005-03-31 2011-08-10 株式会社三井住友銀行 Contract falsification prevention system and contract falsification prevention method
JP2008035164A (en) * 2006-07-28 2008-02-14 Fuji Xerox Co Ltd Image processing system, image processing device, and image processing program
JP4669458B2 (en) * 2006-09-19 2011-04-13 オムロン株式会社 Article management code marking processing system and article management code marking method
JP4978166B2 (en) * 2006-11-21 2012-07-18 ソニー株式会社 Ticketing management system, providing server, and usage management server
JP4524429B2 (en) * 2007-03-30 2010-08-18 株式会社デンソーウェーブ Information code printing medium reading method and information code printing medium reading apparatus
CN102236810A (en) * 2010-04-23 2011-11-09 富港电子(昆山)有限公司 QR (Quick Response) code with hidden codes, and formation and identification methods of hidden codes
US9589217B2 (en) * 2014-07-09 2017-03-07 Xeroc Corporation Augmenting barcodes with secondary encoding for anti-counterfeiting
JP6283772B2 (en) * 2014-09-23 2018-02-21 シス−テック ソリューションズ,インコーポレイテッド Method and system for verifying mark reliability
CN104392260A (en) * 2014-12-17 2015-03-04 肖学静 Two-dimensional code anti-counterfeiting method based on additional information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113468546A (en) * 2020-07-14 2021-10-01 青岛海信电子产业控股股份有限公司 Image processing method and intelligent equipment

Also Published As

Publication number Publication date
JP2018136833A (en) 2018-08-30
WO2018155148A1 (en) 2018-08-30
JP6231233B1 (en) 2017-11-15

Similar Documents

Publication Publication Date Title
TW201835816A (en) Method for generating image data of a code, and method for determining authenticity or false of the code
US10235618B2 (en) Authentication feature in a barcode
US7188774B2 (en) Method and apparatus for making articles
US20170200035A1 (en) Optical code, and method and apparatus for reading optical code
US7581242B1 (en) Authenticating products
US9010654B2 (en) Monitoring moving articles
JP2013534683A (en) Method and apparatus for product marking and authentication by consumers
CN106408063B (en) Printing medium, method of generating the same, method of scanning the same, and label
EP3356995B1 (en) Method and system of forensic encryption
CN109643362B (en) Providing and reading indicia on an article
JP6284676B1 (en) Code image data generation method and code authenticity determination method
US11636565B1 (en) Tamper detection arrangements, and point of sales systems employing same
JP2005338669A (en) Body and article for genuineness decision making, and genuineness deciding method thereof
JP2021056613A (en) Two-dimensional code, print object having the same printed thereon, two-dimensional code generator, two-dimensional code reader, two-dimensional code generation method, two-dimensional code reading method, two-dimensional code generation program, two-dimensional code reading program, computer readable recording medium and recorded device
TWI770123B (en) Information processing apparatus, program, information processing method and information processing system
GB2399669A (en) Associating data with an article
WO2015131163A1 (en) Method, system, and apparatus for creating an enhancing
GB2407425A (en) Associating data with an article
JP2015199267A (en) System for manufacturing coupon with forgery preventing pattern