WO2013145224A1 - 2d code reading device, 2d code reading method, and program - Google Patents
2d code reading device, 2d code reading method, and program Download PDFInfo
- Publication number
- WO2013145224A1 WO2013145224A1 PCT/JP2012/058425 JP2012058425W WO2013145224A1 WO 2013145224 A1 WO2013145224 A1 WO 2013145224A1 JP 2012058425 W JP2012058425 W JP 2012058425W WO 2013145224 A1 WO2013145224 A1 WO 2013145224A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dimensional code
- authentication
- code
- reading
- information
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/12—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using a selected wavelength, e.g. to sense red marks and ignore blue marks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
- G06K19/14—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1434—Barcodes with supplemental or add-on codes
Definitions
- the present invention relates to a two-dimensional code reading device, a two-dimensional code reading method, and a program.
- the two-dimensional code has three positioning symbols obtained by combining squares with a specific ratio, and a plurality of cells arranged between the positioning symbols. By dividing the cells into white and black, a predetermined code is obtained. It expresses the information.
- Patent Document 1 discloses a two-dimensional code.
- Such a two-dimensional code is often used because it can express more information than a barcode.
- the two-dimensional code represents information of a specific URL (Uniform Resource Locator) such as a company or an organization.
- the two-dimensional code is read by a reading device provided in a mobile phone or the like, so that the URL can be easily accessed from the mobile phone or the like.
- 2D code is basically a combination of white and black, so it can be copied using a copier.
- some two-dimensional codes have a monetary value as information, such as a cash voucher or a coupon. For this reason, it is necessary to prevent unauthorized use of a two-dimensional code having a value equivalent to money.
- the present invention has been made to solve the above-described problems, and an object of the present invention is to provide a two-dimensional code reading device, a two-dimensional code reading method, and a program suitable for preventing two-dimensional code duplication.
- a two-dimensional code reader provides: Detection means for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code; A reading means for reading information indicated by the two-dimensional code when the authentication code is detected by the detection means; Is provided.
- the reading means includes A comparison means for comparing the authentication information indicated by the detected authentication code with the information indicated by the two-dimensional code when the authentication code is detected by the detection means; As a result of comparison by the comparison means, when the authentication information and all or part of the information indicated by the two-dimensional code match, the information indicated by the two-dimensional code is acquired as a reading result; You may do it.
- the information indicated by the two-dimensional code is encrypted,
- the reading unit decrypts the encrypted information indicated by the two-dimensional code using a decryption key indicated by the detected authentication code, thereby Read encrypted information, You may do it.
- the information indicated by the two-dimensional code is encrypted
- Storage means for storing each decryption key of the two-dimensional code readable by the reading means in association with authentication information indicated by the authentication code written in the two-dimensional code
- the reading means includes An acquisition means for acquiring a decryption key stored in the storage means in association with authentication information indicated by the detected authentication code when the detection means is detected by the detection means; Decrypting means for reading the encrypted information by decrypting the encrypted information indicated by the two-dimensional code using the acquired decryption key; May be included.
- the reading unit reads the information indicated by the two-dimensional code when the detection unit detects a predetermined number or more of the authentication codes; You may do it.
- the reading means acquires the information indicated by the two-dimensional code as a reading result when authentication information indicated by a plurality of authentication codes detected by the detection means satisfies a predetermined condition. You may do it.
- the authentication code is written in a quiet zone of the two-dimensional code. You may do it.
- the invisible ink is an infrared ink; You may do it.
- a two-dimensional code reading method includes: A detection step of detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code; A reading step of reading information indicated by the two-dimensional code when the authentication code is detected by the detection step; Is provided.
- a program provides: On the computer, A detection procedure for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code; When the authentication code is detected by the detection procedure, a reading procedure for reading information indicated by the two-dimensional code; Is executed.
- the present invention it is possible to provide a two-dimensional code reading device, a two-dimensional code reading method, and a program suitable for preventing duplication of a two-dimensional code.
- the two-dimensional code is a code in a display format that can hold information in two directions, such as a QR (Quick Response) code (registered trademark).
- Information included in the two-dimensional code includes product and product management information, a URL for accessing with a mobile phone, and information used as a voucher or coupon.
- the two-dimensional code 1 is used as a point issuing ticket that can be exchanged for a product at a predetermined URL.
- the two-dimensional code 1 read by the reading device 10 according to the present invention is as follows. Not limited to this, it may be used for other purposes.
- FIG. 1 is a plan view showing an example of a two-dimensional code according to the present embodiment.
- 2D code 1 is composed of a plurality of square cells arranged in a matrix. Among the plurality of cells, various types of information are expressed by a distribution pattern of cells having a predetermined lightness (black in this example) and cells having a predetermined lightness or higher (white in this example).
- information on the URL and information on the number of points such as “3 points” and “5 points”, for example. are expressed by a distribution pattern of a plurality of cells.
- Three positioning symbols 2a, 2b, and 2c are arranged at three different corners in the two-dimensional code 1.
- the three positioning symbols 2a, 2b, and 2c are for enabling the reader to detect the position and orientation of the two-dimensional code 1.
- Such three positioning symbols 2a, 2b, and 2c are distinguished from other cells by arranging a plurality of cells so as to form a distribution pattern in which squares of a specific ratio are combined.
- a quiet zone 3 is arranged around the two-dimensional code 1.
- the quiet zone 3 is also called a clear area, a margin, and the like, and is a blank area for distinguishing from other information on the medium to which the two-dimensional code 1 is added.
- the quiet zone 3 has a predetermined number of cell sizes (for example, four cells), and forms a margin so as to surround the two-dimensional code 1.
- a dotted line is drawn on the edge to show the area of the quiet zone 3, but this dotted line is not actually drawn.
- an authentication code 4 is arranged in the upper left corner of the quiet zone 3. This authentication code 4 is for preventing duplication of the two-dimensional code 1 and expresses authentication information required when the reading device reads the two-dimensional code 1. More specifically, the authentication code 4 is configured as shown in FIG.
- FIG. 2 is a plan view showing an example of the authentication code 4.
- the authentication code 4 is a code having a smaller vertical and horizontal size than the two-dimensional code 1, and is composed of a plurality of square cells arranged in a matrix.
- the authentication code 4 has one positioning symbol 5 for position detection at its corner.
- a quiet zone 6 having a predetermined number of cell sizes (for example, two cells) is disposed around the authentication code 4.
- the plurality of cells constituting the authentication code 4 are marked with invisible ink so as not to be duplicated by the copying machine. That is, for the sake of easy understanding, a plurality of cells of the actual authentication code 4 are shown by black diagonal lines in FIG. 2, but the quiet zone 3 of the two-dimensional code 1 is made of transparent ink that is not visible with visible light. It is written in.
- the invisible ink is a transparent ink that allows visible light to pass therethrough, and is an ink such that an illumination lamp used in a scanner of a general copier has no sensitivity for the purpose of preventing duplication.
- Examples of the invisible ink include ink that is difficult to detect with an ordinary camera having sensitivity to visible light, such as infrared ink, and that can be detected with an infrared camera.
- the authentication code 4 is described as being written in infrared ink. That is, the authentication code 4 includes a cell having a predetermined wavelength in the infrared region that is less than a predetermined brightness (black in the example of FIG. 2) and a cell having a predetermined wavelength in the infrared region that has a predetermined brightness or more (white in the example of FIG. 2).
- the authentication information of the two-dimensional code 1 is expressed by the distribution pattern of
- the authentication code 4 Since it is written in such invisible ink, the authentication code 4 is difficult to be duplicated and does not affect the function of the quiet zone 3 for detecting the two-dimensional code 1.
- the authentication code of the present invention is not limited to a plurality of cells arranged in a matrix, and may be composed of characters, symbols, figures, patterns, appropriate images, and the like. That is, characters, symbols, figures, patterns, appropriate images, etc. may be written in the quiet zone 3 of the two-dimensional code 1 with invisible ink that is not duplicated by a copying machine.
- the invisible ink on which the authentication code of the present invention is written is not limited to infrared ink.
- an illumination lamp used in a scanner of a general copying machine may be an ultraviolet ink that can be detected by an ultraviolet camera.
- FIG. 3 is a block diagram showing a configuration example of the reading device for the two-dimensional code 1 as described above.
- the reading device 10 includes a two-dimensional code reading unit 11, an authentication code reading unit 12, a display unit 13, a storage unit 14, an operation unit 15, a communication unit 16, and a control unit 17. These units are connected to each other via a bus.
- the two-dimensional code reading unit 11 is composed of, for example, a general-purpose two-dimensional code reader.
- the two-dimensional code reading unit 11 images the two-dimensional code 1 using a camera including an image sensor such as a CCD (Charge-Coupled Device).
- the two-dimensional code reading unit 11 detects the two-dimensional code 1 from the image obtained by imaging, reads various information indicated by the two-dimensional code 1, and supplies the information to the control unit 17.
- the two-dimensional code reading unit 11 recognizes a cell having a predetermined brightness as “0” while recognizing a cell having a predetermined brightness or higher as “1”. To do. Then, the two-dimensional code reading unit 11 reads various information from the binary data distribution pattern composed of “0” and “1” recognized in this way.
- the authentication code reading unit 12 includes a two-dimensional code reader that can detect infrared rays, and reads the authentication code 4 written in infrared ink.
- the authentication code reading unit 12 uses an infrared camera provided with an image sensor suitable for the spectrum specific to the infrared ink used for the authentication code 4, such as an image sensor such as a CCD having sensitivity to infrared light. Take an image. Then, the authentication code reading unit 12 detects the authentication code 4 from the infrared image obtained by imaging, reads various information indicated by the authentication code 4, and supplies the information to the control unit 17.
- the authentication code reading unit 12 recognizes a cell having a predetermined wavelength in the infrared region less than a predetermined brightness as “0” in the authentication code 4 shown in FIG. A cell having a predetermined brightness or higher at a wavelength of is recognized as “1”. Then, the authentication code reading unit 12 reads various information from the binary data distribution pattern composed of “0” and “1” recognized in this way.
- the two-dimensional code reading unit 11 and the authentication code reading unit 12 do not have to be configured by separate cameras.
- a camera including a single image sensor having sensitivity from visible light to infrared wavelength region may simultaneously image the two-dimensional code 1 and the authentication code 4, or separate visible light and infrared light through a filter. Therefore, the image may be captured.
- the display unit 13 includes, for example, an LCD (Liquid Crystal Display). Under the control of the control unit 17, the display unit 13 displays an image captured by the two-dimensional code reading unit 11 as a through image or displays information read from the two-dimensional code 1.
- LCD Liquid Crystal Display
- the storage unit 14 is composed of, for example, a nonvolatile memory.
- the storage unit 14 stores various information necessary for reading the two-dimensional code 1 and information for performing authentication by reading the authentication code 4.
- the operation unit 15 is operated by the user, and includes, for example, a cross cursor key, an alphanumeric button for inputting numbers and characters, and the like.
- the user operates the operation unit 15 to instruct to read the two-dimensional code 1 and to instruct to access the URL read from the two-dimensional code 1.
- the communication unit 16 includes, for example, a wireless communication device and is connected to a network. Under the control of the control unit 17, the communication unit 16 accesses, for example, a URL server read from the two-dimensional code 1, and transmits and receives various types of information.
- a URL server read from the two-dimensional code 1
- the control unit 17 includes, for example, a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like.
- the CPU controls the operation of each unit of the reading apparatus 10 by appropriately executing various programs stored in the ROM, the storage unit 14, and the like using the RAM as a work memory.
- FIG. 4 is a flowchart showing an example of the reading process of the two-dimensional code 1 according to the present embodiment.
- the control unit 17 determines whether or not the two-dimensional code 1 reading switch has been pressed (step S1). That is, the control unit 17 determines whether or not the operation unit 15 is operated by the user and an instruction to read the two-dimensional code 1 is input.
- step S1 If it is determined that the reading switch is not pressed (step S1; No), the process remains at step S1. That is, the control unit 17 determines whether or not the reading switch is continuously pressed, and waits until the reading switch is pressed.
- the control unit 17 uses the authentication code reading unit 12 to acquire a photographed image using infrared rays (step S2). That is, when the reading switch is pressed by the user, the control unit 17 first acquires a photographed image by infrared rays in order to read the authentication code 4. Specifically, the control unit 17 generates an infrared image representing the state of the real world within the field of view of the infrared camera of the authentication code reading unit 12, and stores the generated image data in, for example, a RAM.
- the control unit 17 determines whether or not the authentication code 4 is present in the acquired captured image (step S3). Specifically, the control unit 17 searches the captured image data and determines whether there is an image corresponding to the quiet zone 6 or the positioning symbol 5 included in the authentication code 4. Thereby, the control part 17 discriminate
- step S3 If it is determined that there is no authentication code 4 (step S3; No), that is, if the authentication code 4 is not detected, the control unit 17 uses the display unit 13 to display that the two-dimensional code 1 cannot be read. (Step S4). And the reading process of the two-dimensional code 1 in this flowchart is complete
- step S3 when it is determined that the authentication code 4 is present (step S3; Yes), that is, when the authentication code 4 is detected, the control unit 17 reads the authentication code 4 in the image data (step S5). That is, the control unit 17 obtains the direction and size of the authentication code 4 from the data of the quiet zone 6 and the positioning symbol 5 in the image data, and reads information expressed by a distribution pattern of a plurality of cells constituting the authentication code 4. .
- the control unit 17 uses the two-dimensional code reading unit 11 to acquire a photographed image by a normal camera (step S6). That is, the control unit 17 detects the two-dimensional code 1 and reads the information indicated by the two-dimensional code 1, and thus acquires a captured image using visible light. Specifically, the control unit 17 generates an image representing the state of the real world within the field of view of the camera of the two-dimensional code reading unit 11, and holds the generated image data in, for example, a RAM.
- the control unit 17 reads the two-dimensional code 1 in the captured image (step S7). Specifically, the control unit 17 detects the quiet zone 3 and the positioning symbols 2a, 2b, and 2c in the image data, and the two-dimensional code 1 is detected from the data of the detected quiet zone 3 and the positioning symbols 2a, 2b, and 2c. Find the direction and size. Then, the control unit 17 reads information expressed by a distribution pattern of a plurality of cells constituting the two-dimensional code 1.
- the control unit 17 compares the information read from the two-dimensional code 1 with the authentication information (step S8), and all or a part of the information of the two-dimensional code 1 matches the authentication information. It is determined whether or not to perform (step S9). That is, in this embodiment, the authentication code 4 has authentication information that matches information included in the two-dimensional code 1 to which the authentication code 4 is attached in advance. Then, the control unit 17 authenticates the two-dimensional code 1 by comparing the authentication information read from the authentication code 4 with the information indicated by the two-dimensional code 1.
- the fact that all or a part of the information of the two-dimensional code 1 matches the authentication information means that the information indicated by the two-dimensional code 1 includes the same or corresponding information as the authentication information. For example, when the authentication information is information “A” and the same information “A” is included in the two-dimensional code 1, the two match. Alternatively, when the authentication information is information “A” and the information “A ′” corresponding to the two-dimensional code 1 is included, the two match.
- step S9 If it is determined in step S9 that they do not match (step S9; No), the control unit 17 displays that the two-dimensional code 1 cannot be read using the display unit 13 (step S4). And the reading process of the two-dimensional code 1 in this flowchart is complete
- step S9 if it is determined that they match (step S9; Yes), the control unit 17 acquires information read from the two-dimensional code 1 as a reading result (step S10), and based on the acquired information of the two-dimensional code 1. The process is executed (step S11).
- the control unit 17 accesses the URL read from the two-dimensional code 1 using the communication unit 16. To do. And the control part 17 transmits the instruction
- the control unit 17 uses the communication unit 16 to access the URL read from the two-dimensional code 1, and from the URL server to the coupon Get display data.
- the user can use the two-dimensional code 1 as a coupon by displaying an image based on the coupon display data on the display unit 13 and presenting the image to the service provider.
- the URL server read from the two-dimensional code 1 stores, for example, the ID (Identification) Data) of the two-dimensional code 1 once added with the points, and the points are added a plurality of times from the same two-dimensional code 1. Management may be performed to prevent this from happening.
- the two-dimensional code 1 reading device 10 can read the two-dimensional code 1 with the authentication code 4 written in invisible ink in the quiet zone 3. At this time, if the authentication information read from the authentication code 4 does not match all or part of the information read from the two-dimensional code 1, the reading device 10 is based on the information read from the two-dimensional code 1. Do not execute processing. Therefore, the process is not executed from the two-dimensional code 1 that is duplicated and does not have the correct authentication code 4. As a result, it is possible to prevent the two-dimensional code 1 used for a gold ticket or a point ticket from being illegally used by duplication.
- the authentication code 4 has authentication information that matches the information included in the two-dimensional code 1 to which the authentication code 4 is attached.
- the correspondence relationship between the authentication information that is the matching condition and the information of the two-dimensional code 1 may be stored in advance in the storage unit 14 of the reading device 10 as illustrated in FIG. 5, for example.
- authentication information A, authentication information B, authentication information C,... are information A ′ included in the two-dimensional code, information B ′ included in the two-dimensional code, and information included in the two-dimensional code, respectively.
- the storage unit 14 includes, for each of the two-dimensional codes 1 that can be read by the two-dimensional code reading unit 11, information to be compared included in the two-dimensional code 1 and authentication attached to the two-dimensional code 1.
- the authentication information indicated by the code 4 is stored in association with each other.
- the two-dimensional code 1 and the authentication code 4 each have numeric data for authentication, and the sum or product of the number read from the two-dimensional code 1 and the number read from the authentication code 4
- the above-mentioned matching condition may be satisfied when the result of the calculation matches a predetermined number.
- the reading device 10 of the present embodiment includes a two-dimensional code reading unit 11, an authentication code reading unit 12, a display unit 13, a storage unit 14, an operation unit 15, and communication.
- the two-dimensional code 1 read by the reading device 10 according to the present embodiment expresses various types of information by a plurality of cells arranged in a matrix like the two-dimensional code 1 according to the first embodiment.
- an authentication code 4 for preventing duplication is written in invisible ink.
- the two-dimensional code 1 of the present embodiment is encrypted so as not to be read by a general-purpose two-dimensional code reader.
- the information included in the two-dimensional code 1 is converted by a conversion algorithm that can be decrypted only with a predetermined decryption key, and a protection process is performed such that the information cannot be read by devices other than the reader 10.
- the authentication code 4 has information for decrypting the encrypted two-dimensional code 1.
- FIG. 6 is a flowchart showing an example of the reading process of the two-dimensional code 1 according to the present embodiment.
- the control unit 17 determines whether or not the reading switch of the two-dimensional code 1 is pressed (step S21). That is, the control unit 17 determines whether or not the operation unit 15 is operated by the user and an instruction to read the two-dimensional code 1 is input.
- step S21 If it is determined that the reading switch has not been pressed (step S21; No), the process remains at step S1. That is, the control unit 17 determines whether or not the reading switch is continuously pressed, and waits until the reading switch is pressed.
- the control unit 17 uses the authentication code reading unit 12 to acquire a photographed image using infrared rays (step S22). That is, when the reading switch is pressed by the user, the control unit 17 first acquires a photographed image by infrared rays in order to read the authentication code 4. Specifically, the control unit 17 generates an infrared image representing the state of the real world within the field of view of the infrared camera of the authentication code reading unit 12, and stores the generated image data in, for example, a RAM.
- the control unit 17 determines whether or not the authentication code 4 is present in the acquired captured image (step S23). Specifically, the control unit 17 searches the captured image data and determines whether there is an image corresponding to the quiet zone 6 or the positioning symbol 5 included in the authentication code 4. Thereby, the control part 17 discriminate
- step S23 If it is determined that there is no authentication code 4 (step S23; No), that is, if the authentication code 4 is not detected, the control unit 17 uses the display unit 13 to display that the two-dimensional code 1 cannot be read. (Step S24). And the reading process of the two-dimensional code 1 in this flowchart is complete
- step S23 if it is determined that the authentication code 4 is present (step S23; Yes), that is, if the authentication code 4 is detected, the control unit 17 reads the authentication code 4 in the image data (step S25).
- a decryption key of dimension code 1 is acquired (step S26). That is, the authentication code 4 indicates the information of the decryption key of the two-dimensional code 1 to which the authentication code 4 is attached by the cell distribution pattern.
- the control unit 17 obtains the direction and size of the authentication code 4 from the data of the quiet zone 6 and the positioning symbol 5 in the image data, and reads information expressed by a distribution pattern of a plurality of cells constituting the authentication code 4.
- the decryption key of the two-dimensional code 1 is acquired.
- the control unit 17 uses the two-dimensional code reading unit 11 to acquire a photographed image by a normal camera (step S27). That is, the control unit 17 detects the two-dimensional code 1 and reads the information indicated by the two-dimensional code 1, and thus acquires a captured image using visible light. Specifically, the control unit 17 generates an image representing the state of the real world within the field of view of the camera of the two-dimensional code reading unit 11, and holds the generated image data in, for example, a RAM.
- the control unit 17 reads the two-dimensional code 1 in the captured image (step S28). Specifically, the control unit 17 detects the quiet zone 3 and the positioning symbols 2a, 2b, and 2c in the image data, and the two-dimensional code 1 is detected from the data of the detected quiet zone 3 and the positioning symbols 2a, 2b, and 2c. Find the direction and size. Then, the control unit 17 reads information expressed by a distribution pattern of a plurality of cells constituting the two-dimensional code 1.
- the control unit 17 decodes the read information of the two-dimensional code 1 (step S29). That is, the two-dimensional code 1 is encrypted so as not to be read by a general-purpose two-dimensional code reader. The control unit 17 decrypts the encrypted information read from the two-dimensional code 1 using the decryption key acquired in step S26.
- control unit 17 executes a process based on the decoded information of the two-dimensional code 1 (step S30). Then, the reading process of the two-dimensional code 1 in this flowchart is complete
- the two-dimensional code 1 reading device 10 acquires the decryption key of the two-dimensional code 1 from the authentication code 4 written with invisible ink in the quiet zone 3, and uses this decryption key. By using it, information is read from the two-dimensional code 1. Therefore, since the decryption key is not acquired from the two-dimensional code 1 that is duplicated and does not have the correct authentication code 4, information is not read. As a result, it is possible to prevent the two-dimensional code 1 used for a gold ticket or a point ticket from being illegally used by duplication.
- the decryption key information of the two-dimensional code 1 is included in the authentication code 4 attached to the two-dimensional code 1.
- the decryption key in the present invention may be stored in the storage unit 14 of the reading device 10. In this case, for example, as illustrated in FIG. 7, the storage unit 14 stores the authentication information and the decryption key of the two-dimensional code 1 in association with each other.
- authentication information X, authentication information Y, authentication information Z,... are indicated by authentication code 4 attached to two-dimensional code X, two-dimensional code Y, two-dimensional code Z,.
- Authentication information That is, the decryption key for reading the two-dimensional code X is associated with the authentication information X indicated by the authentication code 4 attached to the two-dimensional code X, and the decryption key for reading the two-dimensional code Y is The decryption key for reading the two-dimensional code Z, which is associated with the authentication information Y indicated by the authentication code 4 attached to the dimension code Y, is stored in the authentication information Z indicated by the authentication code 4 attached to the two-dimensional code Z. It is associated.
- the storage unit 14 attaches the decryption key data of the two-dimensional code 1 to the two-dimensional code 1 for each of the two-dimensional codes 1 that can be read by the two-dimensional code reading unit 11. Stored in association with the authentication information read from the authentication code 4 that has been read. Then, when the authentication code reading unit 12 reads the authentication code 4, the control unit 17 obtains a decryption key stored in association with the read authentication information in advance.
- this invention is not limited to the said embodiment, A various deformation
- the processing of the information read from the two-dimensional code 1 is appropriately authenticated by the authentication code 4 detected by the authentication code reading unit 12 and further by the authentication information read from the authentication code 4. If executed.
- the authentication processing using the authentication information read from the authentication code 4 may be omitted.
- the two-dimensional code reading unit 11 reads the two-dimensional code 1, and the process is performed regardless of the authentication information included in the authentication code 4. It may be executed. With such a configuration, duplication of the two-dimensional code 1 can be prevented by simpler means.
- the information indicated by the two-dimensional code 1 is not processed unless it is properly authenticated by the authentication information read from the authentication code 4.
- the authentication information read from the authentication code 4 may be transmitted to the URL server, and the authentication process may be performed in the server.
- the authentication information read from the authentication code 4 is compared with the information of the two-dimensional code 1, and if both match, for example, a predetermined point is added such that points are added. These processes may be executed.
- a decryption key associated with the authentication information read from the authentication code 4 is acquired, and processing such as point addition is not performed without this decryption key May be applied.
- the reading process of the two-dimensional code 1 may be executed.
- FIG. 8 is a diagram showing an example of the two-dimensional code 1 in which four authentication codes 4 are written at the four corners of the quiet zone 3.
- the control unit 17 detects each of the four authentication codes 4 by the authentication code reading unit 12. More specifically, the control unit 17 detects the authentication codes 4 one by one using the authentication code reading unit 12 for each of the four authentication codes 4 marked at the four corners. Alternatively, the control unit 17 acquires one infrared image by the authentication code reading unit 12 having a field of view in which all four authentication codes 4 written at the four corners are included, and four authentication codes are extracted from the infrared images. 4 may be detected.
- control part 17 performs the reading process of the two-dimensional code 1 when the authentication code 4 more than a predetermined number is detected.
- the reading process of the two-dimensional code 1 may not be performed unless all four authentication codes 4 are detected, or more than a predetermined number such as one, two, three, etc.
- the reading process of the two-dimensional code 1 may be executed.
- control unit 17 reads the authentication information from the plurality of detected authentication codes 4, and the read authentication information satisfies predetermined conditions as described below. If it is satisfied, the two-dimensional code 1 may be read.
- the four authentication codes 4 may include mutually matching authentication information, and the control unit 17 may compare the authentication information included in the detected four authentication codes 4 with each other. And it may be set as a condition for reading the information of the two-dimensional code 1 that the four pieces of authentication information match.
- the control unit 17 compares the detected authentication information of the authentication code 4 with the information of the two-dimensional code 1, and if the authentication information matches all or part of the information of the two-dimensional code 1, the control unit 17 You may make it acquire the information of code
- the matching condition at this time can be satisfied when the four pieces of authentication information are the same or correspond to each other, as in the first embodiment.
- Each of the authentication information included in the four authentication codes 4 partially includes the decryption key data of the two-dimensional code 1, and the control unit 17 combines the four authentication information read by the authentication code reading unit 12. Thus, one decryption key may be acquired.
- the fact that the decryption key can be acquired from the four authentication codes 4 may be a condition for reading the information of the two-dimensional code 1.
- the combination of the four authentication information and the decryption key of the two-dimensional code 1 are associated with each other and stored in advance in the storage unit 14 or the like, and the control unit 17 reads the four authentication information read by the authentication code reading unit 12.
- a combination and a decryption key stored in association with the combination may be acquired.
- a condition for reading the information of the two-dimensional code 1 may be that the decryption key associated with the combination of the four pieces of authentication information can be acquired.
- the authentication code 4 is arranged so as to be within the quiet zone 3 of the two-dimensional code 1.
- the authentication code 4 in the present invention may be arranged at any position, for example, outside the quiet zone 3 as long as it can be read appropriately.
- the authentication code 4 is preferably arranged as close to the two-dimensional code 1 as possible.
- the authentication code 4 may be arranged so as to extend over both the area where the two-dimensional code 1 is written and the quiet zone 3.
- the authentication code 4 since the authentication code 4 is written in ink that transmits visible light, even if the authentication code 4 is written over the two-dimensional code 1, it does not prevent the two-dimensional code reading unit 11 from reading the two-dimensional code 1. .
- the authentication code reading unit 12 can appropriately read the infrared rays from the authentication code 4 without being obstructed by the visible light from the two-dimensional code 1, the authentication code 4 is written at a position overlapping the two-dimensional code 1. Even if it is, the authentication code 4 can be read appropriately.
- the authentication code of the present invention may be a one-dimensional code.
- the authentication code may be an authentication code 7 written in invisible ink over one side of the quiet zone 3 of the two-dimensional code 1.
- the authentication code of the present invention includes characters, symbols, figures, patterns, appropriate images, etc., as long as the predetermined authentication information can be expressed by the authentication code reader 12. It may be.
- the two-dimensional code 1 may be displayed with a logo superimposed thereon. That is, a logo such as a figure, a character, a symbol, or a picture may be designed on a plurality of cells having a lightness distribution pattern as shown in FIG.
- a logo expressing the characters “3 points” so as to be visible is superimposed on the two-dimensional code 1 and displayed.
- Such logos overlap circular cells with less than a predetermined brightness (black cells in this example) on areas of the logo that have a predetermined brightness or higher, while circles with a predetermined brightness or higher in the logo with a predetermined brightness. Are formed by overlapping the cells (in this example, white cells).
- the two-dimensional code 1 on which the logo is superimposed various types of information can be obtained depending on the distribution pattern of the area below the predetermined brightness and the cells below the predetermined brightness in the logo, and the area above the predetermined brightness and the cells above the predetermined brightness in the logo. Is expressed.
- the two-dimensional code 1 on which such a logo is superimposed is preferably full color from the viewpoint of preventing forgery, but may be gray scale.
- the shape of the cell for representing the logo is arbitrary, and may be a circle, a polygon, a star, or the like.
- the information content included in the two-dimensional code 1 can be recognized by the user.
- the logo of the number of points is not limited, and a logo of a company that handles point issuance tickets may be designed to be superimposed on the two-dimensional code 1. Thereby, the visibility and designability of the two-dimensional code 1 can be enhanced.
- the two-dimensional code 1 on which the logo is superimposed is formed by superimposing a circular cell (in this example, a white cell) with a predetermined brightness or higher on a logo mark with a predetermined brightness or lower.
- a circular cell in this example, a white cell
- Various types of information may be expressed by the distribution pattern of the portion where the cells are not overlapped.
- the two-dimensional code 1 information unique to the two-dimensional code 1, such as information on the date and time of issue and a management number, may be embedded. Thereby, even when there are a plurality of two-dimensional codes 1 expressing the same number of points, each two-dimensional code 1 can be distinguished. Therefore, the degree of prevention of duplication of the two-dimensional code 1 can be further increased.
- the two-dimensional code 1 is described as a QR code (registered trademark).
- the present invention is not limited to this, and the two-dimensional code 1 may be a data matrix, an aztec code, or the like.
- Other matrix type two-dimensional codes such as code one, array tag, box graphic code, maxi code, peri code, soft strip, CP code, carla code, and ultra code may be used.
- a stack type two-dimensional code in which one-dimensional codes such as PDF417, code 49, code 16k, and coder block are vertically stacked may be used.
- the program executed by the CPU has been described as being stored in advance in the ROM, the storage unit 14 or the like.
- the present invention is not limited to this, and is for executing the above-described processing.
- the above program may be applied to an existing general-purpose computer so as to function as the reading device 10 according to the above-described embodiment.
- Such a program can be provided by any method, for example, stored in a computer-readable non-transitory recording medium (flexible disk, CD (Compact Disc) -ROM, DVD (Digital Versatile Disc) -ROM, etc.).
- the program may be distributed, or may be provided by storing the program in a storage on a network such as the Internet and downloading it.
- the application program when the above processing is executed by sharing between the OS and the application program or by cooperation between the OS and the application program, only the application program may be stored in a recording medium or storage. It is also possible to superimpose a program on a carrier wave and distribute it via a network. For example, the program may be posted on a bulletin board (BBS: Bulletin Board System) on the network, and the program may be distributed via the network. Then, this program may be activated and executed in the same manner as other application programs under the control of the OS, so that the above processing can be executed.
- BSS Bulletin Board System
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
A 2D code (1) reading device (10) has a detection means and a reading means. The detection means of the reading device (10) detects an authentication code (4) that is printed with invisible ink within a prescribed distance from the position of the 2D code (1). If the authentication code (4) that is printed with invisible ink within a prescribed distance from the position of the 2D code (1) is detected, the reading means of the reading device (10) reads the information indicated by the 2D code (1).
Description
本発明は、二次元コード読取装置、二次元コード読取方法、及びプログラムに関する。
The present invention relates to a two-dimensional code reading device, a two-dimensional code reading method, and a program.
二次元コードは、特定比率の正方形を組み合わせた3つの位置決めシンボルと、この位置決めシンボル間に配置された複数のセルと、を有しており、セルを白と黒とに塗り分けることによって、所定の情報を表現するものである。二次元コードについては、例えば特許文献1が開示している。
The two-dimensional code has three positioning symbols obtained by combining squares with a specific ratio, and a plurality of cells arranged between the positioning symbols. By dividing the cells into white and black, a predetermined code is obtained. It expresses the information. For example, Patent Document 1 discloses a two-dimensional code.
このような二次元コードは、バーコードに比較して多くの情報を表現できることから、頻繁に使用されるようになっている。例えば、二次元コードは、会社や団体など、特定のURL(Uniform Resource Locator)の情報を表現する。そして、二次元コードは、携帯電話等に備えられた読取装置によって読み取られることで、URLに携帯電話等から容易にアクセスできるように使用される。
Such a two-dimensional code is often used because it can express more information than a barcode. For example, the two-dimensional code represents information of a specific URL (Uniform Resource Locator) such as a company or an organization. The two-dimensional code is read by a reading device provided in a mobile phone or the like, so that the URL can be easily accessed from the mobile phone or the like.
二次元コードは、基本的には白と黒の組合せであるため、複写機などによる複製が可能である。一方、二次元コードには、金券やクーポン券など、金銭的な価値を情報として有するものもある。そのため、このような貨幣に準じた価値を有する二次元コードが複製によって不正に使用されることを防止する必要があった。
2D code is basically a combination of white and black, so it can be copied using a copier. On the other hand, some two-dimensional codes have a monetary value as information, such as a cash voucher or a coupon. For this reason, it is necessary to prevent unauthorized use of a two-dimensional code having a value equivalent to money.
本発明は、上記の課題を解決するためになされたものであり、二次元コードの複製を防止するのに好適な二次元コード読取装置、二次元コード読取方法、及びプログラムを提供することを目的とする。
The present invention has been made to solve the above-described problems, and an object of the present invention is to provide a two-dimensional code reading device, a two-dimensional code reading method, and a program suitable for preventing two-dimensional code duplication. And
上記目的を達成するため、本発明の第1の観点に係る二次元コード読取装置は、
二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出手段と、
前記検出手段によって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取手段と、
を備える。 In order to achieve the above object, a two-dimensional code reader according to the first aspect of the present invention provides:
Detection means for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
A reading means for reading information indicated by the two-dimensional code when the authentication code is detected by the detection means;
Is provided.
二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出手段と、
前記検出手段によって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取手段と、
を備える。 In order to achieve the above object, a two-dimensional code reader according to the first aspect of the present invention provides:
Detection means for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
A reading means for reading information indicated by the two-dimensional code when the authentication code is detected by the detection means;
Is provided.
上記二次元コード読取装置において、
前記読取手段は、
前記検出手段によって前記認証コードが検出された場合、該検出された認証コードが示す認証情報と、前記二次元コードが示す前記情報と、を比較する比較手段を含み、
前記比較手段による比較の結果、前記認証情報と前記二次元コードが示す前記情報の全部又は一部とが合致する場合、前記二次元コードが示す前記情報を読取結果として取得する、
ようにしてもよい。 In the above two-dimensional code reader,
The reading means includes
A comparison means for comparing the authentication information indicated by the detected authentication code with the information indicated by the two-dimensional code when the authentication code is detected by the detection means;
As a result of comparison by the comparison means, when the authentication information and all or part of the information indicated by the two-dimensional code match, the information indicated by the two-dimensional code is acquired as a reading result;
You may do it.
前記読取手段は、
前記検出手段によって前記認証コードが検出された場合、該検出された認証コードが示す認証情報と、前記二次元コードが示す前記情報と、を比較する比較手段を含み、
前記比較手段による比較の結果、前記認証情報と前記二次元コードが示す前記情報の全部又は一部とが合致する場合、前記二次元コードが示す前記情報を読取結果として取得する、
ようにしてもよい。 In the above two-dimensional code reader,
The reading means includes
A comparison means for comparing the authentication information indicated by the detected authentication code with the information indicated by the two-dimensional code when the authentication code is detected by the detection means;
As a result of comparison by the comparison means, when the authentication information and all or part of the information indicated by the two-dimensional code match, the information indicated by the two-dimensional code is acquired as a reading result;
You may do it.
上記二次元コード読取装置において、
前記二次元コードが示す情報は暗号化され、
前記読取手段は、前記検出手段によって前記認証コードが検出された場合、前記二次元コードが示す前記暗号化された情報を該検出された認証コードが示す復号キーを用いて復号することによって、該暗号化された情報を読み取る、
ようにしてもよい。 In the above two-dimensional code reader,
The information indicated by the two-dimensional code is encrypted,
When the detection unit detects the authentication code, the reading unit decrypts the encrypted information indicated by the two-dimensional code using a decryption key indicated by the detected authentication code, thereby Read encrypted information,
You may do it.
前記二次元コードが示す情報は暗号化され、
前記読取手段は、前記検出手段によって前記認証コードが検出された場合、前記二次元コードが示す前記暗号化された情報を該検出された認証コードが示す復号キーを用いて復号することによって、該暗号化された情報を読み取る、
ようにしてもよい。 In the above two-dimensional code reader,
The information indicated by the two-dimensional code is encrypted,
When the detection unit detects the authentication code, the reading unit decrypts the encrypted information indicated by the two-dimensional code using a decryption key indicated by the detected authentication code, thereby Read encrypted information,
You may do it.
上記二次元コード読取装置において、
前記二次元コードが示す情報は暗号化され、
前記読取手段が読み取り可能な二次元コードの復号キーのそれぞれを、該二次元コードに記された認証コードが示す認証情報に対応付けて記憶する記憶手段をさらに備え、
前記読取手段は、
前記検出手段によって前記認証コードが検出された場合、該検出された認証コードが示す認証情報に対応付けられて前記記憶手段に記憶された復号キーを取得する取得手段と、
前記二次元コードが示す前記暗号化された情報を前記取得された復号キーを用いて復号することによって、該暗号化された情報を読み取る復号手段と、
を含むようにしてもよい。 In the above two-dimensional code reader,
The information indicated by the two-dimensional code is encrypted,
Storage means for storing each decryption key of the two-dimensional code readable by the reading means in association with authentication information indicated by the authentication code written in the two-dimensional code;
The reading means includes
An acquisition means for acquiring a decryption key stored in the storage means in association with authentication information indicated by the detected authentication code when the detection means is detected by the detection means;
Decrypting means for reading the encrypted information by decrypting the encrypted information indicated by the two-dimensional code using the acquired decryption key;
May be included.
前記二次元コードが示す情報は暗号化され、
前記読取手段が読み取り可能な二次元コードの復号キーのそれぞれを、該二次元コードに記された認証コードが示す認証情報に対応付けて記憶する記憶手段をさらに備え、
前記読取手段は、
前記検出手段によって前記認証コードが検出された場合、該検出された認証コードが示す認証情報に対応付けられて前記記憶手段に記憶された復号キーを取得する取得手段と、
前記二次元コードが示す前記暗号化された情報を前記取得された復号キーを用いて復号することによって、該暗号化された情報を読み取る復号手段と、
を含むようにしてもよい。 In the above two-dimensional code reader,
The information indicated by the two-dimensional code is encrypted,
Storage means for storing each decryption key of the two-dimensional code readable by the reading means in association with authentication information indicated by the authentication code written in the two-dimensional code;
The reading means includes
An acquisition means for acquiring a decryption key stored in the storage means in association with authentication information indicated by the detected authentication code when the detection means is detected by the detection means;
Decrypting means for reading the encrypted information by decrypting the encrypted information indicated by the two-dimensional code using the acquired decryption key;
May be included.
上記二次元コード読取装置において、
前記二次元コードの位置から所定の範囲内には、前記認証コードが複数記され、
前記読取手段は、前記検出手段によって所定数以上の前記認証コードが検出された場合、前記二次元コードが示す前記情報を読み取る、
ようにしてもよい。 In the above two-dimensional code reader,
Within a predetermined range from the position of the two-dimensional code, a plurality of the authentication codes are written,
The reading unit reads the information indicated by the two-dimensional code when the detection unit detects a predetermined number or more of the authentication codes;
You may do it.
前記二次元コードの位置から所定の範囲内には、前記認証コードが複数記され、
前記読取手段は、前記検出手段によって所定数以上の前記認証コードが検出された場合、前記二次元コードが示す前記情報を読み取る、
ようにしてもよい。 In the above two-dimensional code reader,
Within a predetermined range from the position of the two-dimensional code, a plurality of the authentication codes are written,
The reading unit reads the information indicated by the two-dimensional code when the detection unit detects a predetermined number or more of the authentication codes;
You may do it.
上記二次元コード読取装置において、
前記二次元コードの位置から所定の範囲内には、前記認証コードが複数記され、
前記読取手段は、前記検出手段によって検出された複数の認証コードが示す認証情報が所定の条件を満たす場合、前記二次元コードが示す前記情報を読取結果として取得する、
ようにしてもよい。 In the above two-dimensional code reader,
Within a predetermined range from the position of the two-dimensional code, a plurality of the authentication codes are written,
The reading means acquires the information indicated by the two-dimensional code as a reading result when authentication information indicated by a plurality of authentication codes detected by the detection means satisfies a predetermined condition.
You may do it.
前記二次元コードの位置から所定の範囲内には、前記認証コードが複数記され、
前記読取手段は、前記検出手段によって検出された複数の認証コードが示す認証情報が所定の条件を満たす場合、前記二次元コードが示す前記情報を読取結果として取得する、
ようにしてもよい。 In the above two-dimensional code reader,
Within a predetermined range from the position of the two-dimensional code, a plurality of the authentication codes are written,
The reading means acquires the information indicated by the two-dimensional code as a reading result when authentication information indicated by a plurality of authentication codes detected by the detection means satisfies a predetermined condition.
You may do it.
上記二次元コード読取装置において、
前記認証コードは、前記二次元コードのクワイエットゾーンに記される、
ようにしてもよい。 In the above two-dimensional code reader,
The authentication code is written in a quiet zone of the two-dimensional code.
You may do it.
前記認証コードは、前記二次元コードのクワイエットゾーンに記される、
ようにしてもよい。 In the above two-dimensional code reader,
The authentication code is written in a quiet zone of the two-dimensional code.
You may do it.
上記二次元コード読取装置において、
前記不可視インクは、赤外線インクである、
ようにしてもよい。 In the above two-dimensional code reader,
The invisible ink is an infrared ink;
You may do it.
前記不可視インクは、赤外線インクである、
ようにしてもよい。 In the above two-dimensional code reader,
The invisible ink is an infrared ink;
You may do it.
上記目的を達成するため、本発明の第2の観点に係る二次元コード読取方法は、
二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出ステップと、
前記検出ステップによって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取ステップと、
を備える。 In order to achieve the above object, a two-dimensional code reading method according to a second aspect of the present invention includes:
A detection step of detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
A reading step of reading information indicated by the two-dimensional code when the authentication code is detected by the detection step;
Is provided.
二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出ステップと、
前記検出ステップによって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取ステップと、
を備える。 In order to achieve the above object, a two-dimensional code reading method according to a second aspect of the present invention includes:
A detection step of detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
A reading step of reading information indicated by the two-dimensional code when the authentication code is detected by the detection step;
Is provided.
上記目的を達成するため、本発明の第3の観点に係るプログラムは、
コンピュータに、
二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出手順と、
前記検出手順によって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取手順と、
を実行させる。 In order to achieve the above object, a program according to the third aspect of the present invention provides:
On the computer,
A detection procedure for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
When the authentication code is detected by the detection procedure, a reading procedure for reading information indicated by the two-dimensional code;
Is executed.
コンピュータに、
二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出手順と、
前記検出手順によって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取手順と、
を実行させる。 In order to achieve the above object, a program according to the third aspect of the present invention provides:
On the computer,
A detection procedure for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
When the authentication code is detected by the detection procedure, a reading procedure for reading information indicated by the two-dimensional code;
Is executed.
本発明によれば、二次元コードの複製を防止するのに好適な二次元コード読取装置、二次元コード読取方法、及びプログラムを提供することができる。
According to the present invention, it is possible to provide a two-dimensional code reading device, a two-dimensional code reading method, and a program suitable for preventing duplication of a two-dimensional code.
以下、本発明を実施するための形態について説明する。
Hereinafter, modes for carrying out the present invention will be described.
[第1の実施形態]
まず、第1の実施形態に係る二次元コードの構成について、図面を参照しつつ説明する。 [First Embodiment]
First, the configuration of the two-dimensional code according to the first embodiment will be described with reference to the drawings.
まず、第1の実施形態に係る二次元コードの構成について、図面を参照しつつ説明する。 [First Embodiment]
First, the configuration of the two-dimensional code according to the first embodiment will be described with reference to the drawings.
ここで二次元コードとは、例えばQR(Quick Response)コード(登録商標)などのような、縦方向と横方向の二方向に情報をもつことができる表示形式のコードである。二次元コードが有する情報には、製品や商品の管理情報、携帯電話でアクセスするためのURL、金券やクーポン券として使用される情報、等がある。
Here, the two-dimensional code is a code in a display format that can hold information in two directions, such as a QR (Quick Response) code (registered trademark). Information included in the two-dimensional code includes product and product management information, a URL for accessing with a mobile phone, and information used as a voucher or coupon.
以下、本実施形態では、二次元コード1が所定のURLにおいて商品と交換可能なポイント発行券として使用される場合について主に説明するが、本発明に係る読取装置10が読み取る二次元コード1はこれに限らず、他の用途に使用されるものであってもよい。
Hereinafter, in the present embodiment, a case where the two-dimensional code 1 is used as a point issuing ticket that can be exchanged for a product at a predetermined URL will be mainly described. However, the two-dimensional code 1 read by the reading device 10 according to the present invention is as follows. Not limited to this, it may be used for other purposes.
図1は、本実施形態に係る二次元コードの一例を示す平面図である。
FIG. 1 is a plan view showing an example of a two-dimensional code according to the present embodiment.
二次元コード1は、マトリクス状に配置された複数の正方形のセルから構成される。この複数のセルのうち、所定明度未満のセル(この例では黒)と、所定明度以上のセル(この例では白)と、の分布パターンによって、各種情報が表現される。
2D code 1 is composed of a plurality of square cells arranged in a matrix. Among the plurality of cells, various types of information are expressed by a distribution pattern of cells having a predetermined lightness (black in this example) and cells having a predetermined lightness or higher (white in this example).
例えば、二次元コード1が、所定のURLにおいて商品と交換可能なポイント発行券に使用される場合には、このURLの情報と、例えば「3ポイント」や「5ポイント」などといったポイント数の情報とが、複数のセルの分布パターンによって表現される。
For example, when the two-dimensional code 1 is used for a point issuance ticket that can be exchanged for a product at a predetermined URL, information on the URL and information on the number of points such as “3 points” and “5 points”, for example. Are expressed by a distribution pattern of a plurality of cells.
二次元コード1内の異なる3つの隅部には、3つの位置決めシンボル2a、2b、及び2cが配置される。この3つの位置決めシンボル2a、2b、及び2cは、二次元コード1の位置と向きとを読取装置が検出できるようにするためのものである。このような3つの位置決めシンボル2a、2b、及び2cは、特定の比率の正方形が組み合わさった分布パターンとなるように複数のセルが配置されることで、他のセルと区別される。
Three positioning symbols 2a, 2b, and 2c are arranged at three different corners in the two-dimensional code 1. The three positioning symbols 2a, 2b, and 2c are for enabling the reader to detect the position and orientation of the two-dimensional code 1. Such three positioning symbols 2a, 2b, and 2c are distinguished from other cells by arranging a plurality of cells so as to form a distribution pattern in which squares of a specific ratio are combined.
二次元コード1の周りには、クワイエットゾーン3が配置される。このクワイエットゾーン3は、クリアーエリア、マージンなどとも呼ばれ、二次元コード1が付加される媒体上の他の情報と区別できるようにするための空白領域である。クワイエットゾーン3は、所定の個数のセルサイズ(例えば、セル4個分)の幅を有し、二次元コード1を取り囲むように余白を形成する。なお、図1では、クワイエットゾーン3の領域を示すため、縁に点線を描いているが、実際にはこの点線は描かれない。
A quiet zone 3 is arranged around the two-dimensional code 1. The quiet zone 3 is also called a clear area, a margin, and the like, and is a blank area for distinguishing from other information on the medium to which the two-dimensional code 1 is added. The quiet zone 3 has a predetermined number of cell sizes (for example, four cells), and forms a margin so as to surround the two-dimensional code 1. In FIG. 1, a dotted line is drawn on the edge to show the area of the quiet zone 3, but this dotted line is not actually drawn.
さらに、クワイエットゾーン3の左上隅部には、認証コード4が配置される。この認証コード4は、二次元コード1の複製を防止するためのものであり、読取装置が二次元コード1を読み取る際に必要となる認証情報を表現する。より詳細には、認証コード4は、図2に示すように構成される。
Furthermore, an authentication code 4 is arranged in the upper left corner of the quiet zone 3. This authentication code 4 is for preventing duplication of the two-dimensional code 1 and expresses authentication information required when the reading device reads the two-dimensional code 1. More specifically, the authentication code 4 is configured as shown in FIG.
図2は、認証コード4の一例を示す平面図である。
FIG. 2 is a plan view showing an example of the authentication code 4.
認証コード4は、二次元コード1に比べて縦横のサイズの小さいコードであり、同じくマトリクス状に配置された複数の正方形のセルから構成される。認証コード4は、位置検出のための位置決めシンボル5をその隅部に1つ有する。また、認証コード4の周りには、所定の個数のセルサイズ(例えば、セル2個分)の幅を有するクワイエットゾーン6が配置される。
The authentication code 4 is a code having a smaller vertical and horizontal size than the two-dimensional code 1, and is composed of a plurality of square cells arranged in a matrix. The authentication code 4 has one positioning symbol 5 for position detection at its corner. In addition, a quiet zone 6 having a predetermined number of cell sizes (for example, two cells) is disposed around the authentication code 4.
ここで、認証コード4を構成する複数のセルは、複写機によって複製されないように、不可視インクで記される。すなわち、理解を容易にするために図2では黒色の斜線で示されているが、実際の認証コード4の複数のセルは、可視光では見えない透明なインクで二次元コード1のクワイエットゾーン3に記される。
Here, the plurality of cells constituting the authentication code 4 are marked with invisible ink so as not to be duplicated by the copying machine. That is, for the sake of easy understanding, a plurality of cells of the actual authentication code 4 are shown by black diagonal lines in FIG. 2, but the quiet zone 3 of the two-dimensional code 1 is made of transparent ink that is not visible with visible light. It is written in.
ここで、不可視インクとは、可視光が透過する透明なインクであって、複製防止の目的のため、一般的な複写機のスキャナに用いられる照明ランプが感度を有さないようなインクである。不可視インクとして、例えば、赤外線インクのような、可視光に感度を有する通常のカメラでは検出が困難であり、赤外線カメラでは検出可能なインクが挙げられる。以下では、認証コード4は、赤外線インクで記されるものとして説明する。すなわち、認証コード4は、赤外線領域にある所定の波長において所定明度未満のセル(図2の例では黒)と、赤外線領域にある所定の波長において所定明度以上のセル(図2の例では白)と、の分布パターンによって、二次元コード1の認証情報を表現する。
Here, the invisible ink is a transparent ink that allows visible light to pass therethrough, and is an ink such that an illumination lamp used in a scanner of a general copier has no sensitivity for the purpose of preventing duplication. . Examples of the invisible ink include ink that is difficult to detect with an ordinary camera having sensitivity to visible light, such as infrared ink, and that can be detected with an infrared camera. In the following description, the authentication code 4 is described as being written in infrared ink. That is, the authentication code 4 includes a cell having a predetermined wavelength in the infrared region that is less than a predetermined brightness (black in the example of FIG. 2) and a cell having a predetermined wavelength in the infrared region that has a predetermined brightness or more (white in the example of FIG. 2). The authentication information of the two-dimensional code 1 is expressed by the distribution pattern of
このような不可視インクで記されるため、認証コード4は、複製が困難なものとなり、また、二次元コード1の検出のためのクワイエットゾーン3の機能に影響を与えることもない。
Since it is written in such invisible ink, the authentication code 4 is difficult to be duplicated and does not affect the function of the quiet zone 3 for detecting the two-dimensional code 1.
なお、本発明の認証コードは、マトリクス状に配置された複数のセルから構成されることに限らず、文字、記号、図形、模様、適宜の画像等から構成されていてもよい。すなわち、文字、記号、図形、模様、適宜の画像等が、複写機で複製されないような不可視インクで二次元コード1のクワイエットゾーン3に記されていてもよい。
Note that the authentication code of the present invention is not limited to a plurality of cells arranged in a matrix, and may be composed of characters, symbols, figures, patterns, appropriate images, and the like. That is, characters, symbols, figures, patterns, appropriate images, etc. may be written in the quiet zone 3 of the two-dimensional code 1 with invisible ink that is not duplicated by a copying machine.
また、本発明の認証コードが記される不可視インクは、赤外線インクに限らない。例えば、一般的な複写機のスキャナに用いられる照明ランプが感度を有さないようなインクであれば、紫外線カメラで検出可能な紫外線インクのようなものであってもよい。
Further, the invisible ink on which the authentication code of the present invention is written is not limited to infrared ink. For example, as long as an illumination lamp used in a scanner of a general copying machine has no sensitivity, it may be an ultraviolet ink that can be detected by an ultraviolet camera.
図3は、上記のような二次元コード1の読取装置の構成例を示すブロック図である。
FIG. 3 is a block diagram showing a configuration example of the reading device for the two-dimensional code 1 as described above.
読取装置10は、二次元コード読取部11と、認証コード読取部12と、表示部13と、記憶部14と、操作部15と、通信部16と、制御部17と、を備える。これら各部は、バスを介して相互に接続される。
The reading device 10 includes a two-dimensional code reading unit 11, an authentication code reading unit 12, a display unit 13, a storage unit 14, an operation unit 15, a communication unit 16, and a control unit 17. These units are connected to each other via a bus.
二次元コード読取部11は、例えば汎用の二次元コードリーダなどから構成される。二次元コード読取部11は、二次元コード1を、例えばCCD(Charge-Coupled Device)などの撮像素子を備えるカメラを用いて撮像する。そして、二次元コード読取部11は、撮像によって得られた画像から二次元コード1を検出し、二次元コード1が示す各種情報を読み取って制御部17に供給する。
The two-dimensional code reading unit 11 is composed of, for example, a general-purpose two-dimensional code reader. The two-dimensional code reading unit 11 images the two-dimensional code 1 using a camera including an image sensor such as a CCD (Charge-Coupled Device). The two-dimensional code reading unit 11 detects the two-dimensional code 1 from the image obtained by imaging, reads various information indicated by the two-dimensional code 1, and supplies the information to the control unit 17.
具体的に説明すると、二次元コード読取部11は、図1に示す二次元コード1において、所定明度未満のセルを「0」と認識する一方で、所定明度以上のセルを「1」と認識する。そして、二次元コード読取部11は、このようにして認識した「0」と「1」とからなる二値データの分布パターンから、各種情報を読み取る。
Specifically, in the two-dimensional code 1 shown in FIG. 1, the two-dimensional code reading unit 11 recognizes a cell having a predetermined brightness as “0” while recognizing a cell having a predetermined brightness or higher as “1”. To do. Then, the two-dimensional code reading unit 11 reads various information from the binary data distribution pattern composed of “0” and “1” recognized in this way.
認証コード読取部12は、赤外線を検出可能な二次元コードリーダなどから構成され、赤外線インクで記された認証コード4を読み取る。認証コード読取部12は、認証コード4を、例えば赤外線に感度を有するCCDなどの撮像素子など、認証コード4に使用された赤外線インクに固有のスペクトルに適した撮像素子を備える赤外線カメラを用いて撮像する。そして、認証コード読取部12は、撮像によって得られた赤外線画像から認証コード4を検出し、認証コード4が示す各種情報を読み取って制御部17に供給する。
The authentication code reading unit 12 includes a two-dimensional code reader that can detect infrared rays, and reads the authentication code 4 written in infrared ink. The authentication code reading unit 12 uses an infrared camera provided with an image sensor suitable for the spectrum specific to the infrared ink used for the authentication code 4, such as an image sensor such as a CCD having sensitivity to infrared light. Take an image. Then, the authentication code reading unit 12 detects the authentication code 4 from the infrared image obtained by imaging, reads various information indicated by the authentication code 4, and supplies the information to the control unit 17.
具体的に説明すると、認証コード読取部12は、図2に示す認証コード4において、赤外線領域にある所定の波長において所定明度未満のセルを「0」と認識する一方で、赤外線領域にある所定の波長において所定明度以上のセルを「1」と認識する。そして、認証コード読取部12は、このようにして認識した「0」と「1」とからなる二値データの分布パターンから、各種情報を読み取る。
More specifically, the authentication code reading unit 12 recognizes a cell having a predetermined wavelength in the infrared region less than a predetermined brightness as “0” in the authentication code 4 shown in FIG. A cell having a predetermined brightness or higher at a wavelength of is recognized as “1”. Then, the authentication code reading unit 12 reads various information from the binary data distribution pattern composed of “0” and “1” recognized in this way.
なお、二次元コード読取部11と認証コード読取部12は、別個のカメラから構成されるものでなくともよい。例えば、可視光から赤外線の波長領域にまで感度を有する1つの撮像素子を備えるカメラが、二次元コード1と認証コード4とを同時に撮像してもよいし、フィルタを通して可視光と赤外線とを分離してとらえて撮像するようにしてもよい。
Note that the two-dimensional code reading unit 11 and the authentication code reading unit 12 do not have to be configured by separate cameras. For example, a camera including a single image sensor having sensitivity from visible light to infrared wavelength region may simultaneously image the two-dimensional code 1 and the authentication code 4, or separate visible light and infrared light through a filter. Therefore, the image may be captured.
表示部13は、例えばLCD(Liquid Crystal Display)などから構成される。表示部13は、制御部17による制御のもと、二次元コード読取部11によって撮像された画像をスルー画像として表示したり、二次元コード1から読み取った情報を表示したりする。
The display unit 13 includes, for example, an LCD (Liquid Crystal Display). Under the control of the control unit 17, the display unit 13 displays an image captured by the two-dimensional code reading unit 11 as a through image or displays information read from the two-dimensional code 1.
記憶部14は、例えば不揮発性メモリなどから構成される。記憶部14は、二次元コード1の読み取りに必要となる各種情報や、認証コード4を読み取って認証を行うための情報を記憶する。
The storage unit 14 is composed of, for example, a nonvolatile memory. The storage unit 14 stores various information necessary for reading the two-dimensional code 1 and information for performing authentication by reading the authentication code 4.
操作部15は、ユーザによって操作されるもので、例えば十字カーソルキーや、数字や文字を入力するための英数字ボタンなどから構成される。ユーザは、操作部15を操作して、二次元コード1の読み取る旨の指示をしたり、二次元コード1から読み取ったURLにアクセスする指示をしたりする。
The operation unit 15 is operated by the user, and includes, for example, a cross cursor key, an alphanumeric button for inputting numbers and characters, and the like. The user operates the operation unit 15 to instruct to read the two-dimensional code 1 and to instruct to access the URL read from the two-dimensional code 1.
通信部16は、例えば無線通信装置などから構成され、ネットワークに接続される。通信部16は、制御部17による制御の下、例えば二次元コード1から読み出したURLのサーバにアクセスし、各種情報を送信したり受信したりする。
The communication unit 16 includes, for example, a wireless communication device and is connected to a network. Under the control of the control unit 17, the communication unit 16 accesses, for example, a URL server read from the two-dimensional code 1, and transmits and receives various types of information.
制御部17は、例えばCPU(Central Processing Unit)、ROM(Read Only Memory)、及びRAM(Random Access Memory)などから構成される。制御部17では、CPUが、RAMをワークメモリとして用いてROMや記憶部14などに記憶されている各種プログラムを適宜実行することにより、読取装置10の各部の動作を制御する。
The control unit 17 includes, for example, a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like. In the control unit 17, the CPU controls the operation of each unit of the reading apparatus 10 by appropriately executing various programs stored in the ROM, the storage unit 14, and the like using the RAM as a work memory.
次に、上記構成を備える二次元コード1の読取装置10が実行する処理について図面を参照しつつ説明する。
Next, processing executed by the two-dimensional code 1 reading apparatus 10 having the above-described configuration will be described with reference to the drawings.
図4は、本実施形態に係る二次元コード1の読取処理の一例を示すフローチャートである。
FIG. 4 is a flowchart showing an example of the reading process of the two-dimensional code 1 according to the present embodiment.
読取装置10では、まず制御部17が、二次元コード1の読取スイッチが押されたか否かを判別する(ステップS1)。すなわち、制御部17は、ユーザから操作部15が操作され、二次元コード1を読み取る旨の指示が入力されたか否かを判別する。
In the reading apparatus 10, first, the control unit 17 determines whether or not the two-dimensional code 1 reading switch has been pressed (step S1). That is, the control unit 17 determines whether or not the operation unit 15 is operated by the user and an instruction to read the two-dimensional code 1 is input.
読取スイッチが押されていないと判別されると(ステップS1;No)、処理はステップS1に留まる。すなわち、制御部17は、引き続き読取スイッチが押されたか否かを判別し、読取スイッチが押されるまで待機する。
If it is determined that the reading switch is not pressed (step S1; No), the process remains at step S1. That is, the control unit 17 determines whether or not the reading switch is continuously pressed, and waits until the reading switch is pressed.
一方、読取スイッチが押されたと判別されると(ステップS1;Yes)、制御部17は、認証コード読取部12を用いて、赤外線による撮影画像を取得する(ステップS2)。すなわち、ユーザにより読取スイッチが押されると、制御部17は、まず認証コード4を読み取るため、赤外線による撮影画像を取得する。具体的に制御部17は、認証コード読取部12の赤外線カメラの視野内に収まった現実世界の様子を表す赤外線画像を生成し、生成した画像データを例えばRAMに保持する。
On the other hand, if it is determined that the reading switch has been pressed (step S1; Yes), the control unit 17 uses the authentication code reading unit 12 to acquire a photographed image using infrared rays (step S2). That is, when the reading switch is pressed by the user, the control unit 17 first acquires a photographed image by infrared rays in order to read the authentication code 4. Specifically, the control unit 17 generates an infrared image representing the state of the real world within the field of view of the infrared camera of the authentication code reading unit 12, and stores the generated image data in, for example, a RAM.
赤外線による撮影画像を取得すると、制御部17は、取得した撮影画像内に認証コード4があるか否かを判別する(ステップS3)。具体的に、制御部17は、撮影された画像データを検索し、認証コード4が有するクワイエットゾーン6や位置決めシンボル5に対応する画像があるか否かを判別する。これにより、制御部17は、撮影された赤外線画像データ内に認証コード4があるか否かを判別する。
When acquiring the captured image by infrared rays, the control unit 17 determines whether or not the authentication code 4 is present in the acquired captured image (step S3). Specifically, the control unit 17 searches the captured image data and determines whether there is an image corresponding to the quiet zone 6 or the positioning symbol 5 included in the authentication code 4. Thereby, the control part 17 discriminate | determines whether the authentication code 4 exists in the image | photographed infrared image data.
認証コード4がないと判別されると(ステップS3;No)、すなわち、認証コード4が検出されないと、制御部17は、表示部13を用いて、二次元コード1を読み取れない旨を表示する(ステップS4)。そして、本フローチャートにおける二次元コード1の読取処理は終了する。すなわち、複製された二次元コード1が読み取られないようにするため、制御部17は、撮影された赤外線画像データ内に認証コード4が見つけられない場合には、たとえ二次元コード1が二次元コード読取部11のカメラの視野内にあったとしても、二次元コード1を読み取る処理は行わない。
If it is determined that there is no authentication code 4 (step S3; No), that is, if the authentication code 4 is not detected, the control unit 17 uses the display unit 13 to display that the two-dimensional code 1 cannot be read. (Step S4). And the reading process of the two-dimensional code 1 in this flowchart is complete | finished. That is, in order to prevent the duplicated two-dimensional code 1 from being read, the control unit 17 determines that the two-dimensional code 1 is two-dimensional if the authentication code 4 cannot be found in the captured infrared image data. Even if the code reader 11 is within the field of view of the camera, the process of reading the two-dimensional code 1 is not performed.
一方、認証コード4があると判別されると(ステップS3;Yes)、すなわち、認証コード4が検出されると、制御部17は、画像データ内の認証コード4を読み取る(ステップS5)。すなわち、制御部17は、画像データ内のクワイエットゾーン6や位置決めシンボル5のデータから認証コード4の向きや大きさを求め、認証コード4を構成する複数のセルの分布パターンが表現する情報を読み取る。
On the other hand, when it is determined that the authentication code 4 is present (step S3; Yes), that is, when the authentication code 4 is detected, the control unit 17 reads the authentication code 4 in the image data (step S5). That is, the control unit 17 obtains the direction and size of the authentication code 4 from the data of the quiet zone 6 and the positioning symbol 5 in the image data, and reads information expressed by a distribution pattern of a plurality of cells constituting the authentication code 4. .
認証コード4を読み取ると、制御部17は、二次元コード読取部11を用いて、通常のカメラによる撮影画像を取得する(ステップS6)。すなわち、制御部17は、二次元コード1を検出し、二次元コード1が示す情報を読み取るため、可視光による撮影画像を取得する。具体的に制御部17は、二次元コード読取部11のカメラの視野内に収まった現実世界の様子を表す画像を生成し、生成した画像データを例えばRAMに保持する。
When the authentication code 4 is read, the control unit 17 uses the two-dimensional code reading unit 11 to acquire a photographed image by a normal camera (step S6). That is, the control unit 17 detects the two-dimensional code 1 and reads the information indicated by the two-dimensional code 1, and thus acquires a captured image using visible light. Specifically, the control unit 17 generates an image representing the state of the real world within the field of view of the camera of the two-dimensional code reading unit 11, and holds the generated image data in, for example, a RAM.
撮影画像を取得すると、制御部17は、撮影画像内の二次元コード1を読み取る(ステップS7)。具体的に制御部17は、画像データ内のクワイエットゾーン3及び位置決めシンボル2a、2b、及び2cを検出し、検出したクワイエットゾーン3及び位置決めシンボル2a、2b、及び2cのデータから二次元コード1の向きや大きさを求める。そして、制御部17は、二次元コード1を構成する複数のセルの分布パターンが表現する情報を読み取る。
When the captured image is acquired, the control unit 17 reads the two-dimensional code 1 in the captured image (step S7). Specifically, the control unit 17 detects the quiet zone 3 and the positioning symbols 2a, 2b, and 2c in the image data, and the two-dimensional code 1 is detected from the data of the detected quiet zone 3 and the positioning symbols 2a, 2b, and 2c. Find the direction and size. Then, the control unit 17 reads information expressed by a distribution pattern of a plurality of cells constituting the two-dimensional code 1.
二次元コード1を読み取ると、制御部17は、二次元コード1から読み取った情報と認証情報とを比較し(ステップS8)、二次元コード1の情報の全部又は一部と認証情報とが合致するか否かを判別する(ステップS9)。すなわち、本実施形態では、認証コード4は、この認証コード4が付された二次元コード1に含まれる情報に合致する認証情報を予め有する。そして、制御部17は、認証コード4から読み取られた認証情報と二次元コード1が示す情報との比較を行うことにより、二次元コード1の認証を行う。
When the two-dimensional code 1 is read, the control unit 17 compares the information read from the two-dimensional code 1 with the authentication information (step S8), and all or a part of the information of the two-dimensional code 1 matches the authentication information. It is determined whether or not to perform (step S9). That is, in this embodiment, the authentication code 4 has authentication information that matches information included in the two-dimensional code 1 to which the authentication code 4 is attached in advance. Then, the control unit 17 authenticates the two-dimensional code 1 by comparing the authentication information read from the authentication code 4 with the information indicated by the two-dimensional code 1.
ここで、二次元コード1の情報の全部又は一部と認証情報とが合致するとは、二次元コード1が示す情報に、認証情報と同一又は対応する情報が含まれることをいう。例えば、認証情報が「A」という情報であって、二次元コード1に同一の情報「A」が含まれている場合には、両者は合致する。あるいは、認証情報が「A」という情報であって、二次元コード1に対応する情報「A’」が含まれている場合にも、両者は合致する。
Here, the fact that all or a part of the information of the two-dimensional code 1 matches the authentication information means that the information indicated by the two-dimensional code 1 includes the same or corresponding information as the authentication information. For example, when the authentication information is information “A” and the same information “A” is included in the two-dimensional code 1, the two match. Alternatively, when the authentication information is information “A” and the information “A ′” corresponding to the two-dimensional code 1 is included, the two match.
ステップS9において合致しないと判別されると(ステップS9;No)、制御部17は、表示部13を用いて、二次元コード1を読み取れない旨を表示する(ステップS4)。そして、本フローチャートにおける二次元コード1の読取処理は終了する。すなわち、複製防止の程度をより高めるため、制御部17は、たとえ認証コード4を読み取れたとしても、それが二次元コード1に含まれる情報と合致するものでないと、二次元コード1を読み取る処理は行わない。
If it is determined in step S9 that they do not match (step S9; No), the control unit 17 displays that the two-dimensional code 1 cannot be read using the display unit 13 (step S4). And the reading process of the two-dimensional code 1 in this flowchart is complete | finished. That is, in order to further increase the degree of prevention of duplication, the control unit 17 reads the two-dimensional code 1 if it does not match the information included in the two-dimensional code 1 even if the authentication code 4 can be read. Do not do.
一方、合致したと判別されると(ステップS9;Yes)、制御部17は、二次元コード1から読み取った情報を読取結果として取得し(ステップS10)、取得した二次元コード1の情報に基づいた処理を実行する(ステップS11)。
On the other hand, if it is determined that they match (step S9; Yes), the control unit 17 acquires information read from the two-dimensional code 1 as a reading result (step S10), and based on the acquired information of the two-dimensional code 1. The process is executed (step S11).
例えば、二次元コード1が所定のURLにおいて商品と交換可能なポイント発行券に使用される場合には、制御部17は、通信部16を用いて、二次元コード1から読み取られたURLにアクセスする。そして、制御部17は、同じく二次元コード1から読み取られたポイント数を、このURLにおけるユーザの累積されたポイントに加算する指示を、URLのサーバに送信する。
For example, when the two-dimensional code 1 is used for a point issuing ticket that can be exchanged for a product at a predetermined URL, the control unit 17 accesses the URL read from the two-dimensional code 1 using the communication unit 16. To do. And the control part 17 transmits the instruction | indication which adds the number of points similarly read from the two-dimensional code 1 to the user's accumulated point in this URL to the server of URL.
あるいは、例えば、二次元コード1がクーポン券として使用される場合には、制御部17は、通信部16を用いて、二次元コード1から読み取られたURLにアクセスし、URLのサーバからクーポン券表示データを取得する。ユーザは、クーポン券表示データに基づく画像を表示部13に表示させてサービス提供先に提示することにより、二次元コード1をクーポン券として使用できる。
Alternatively, for example, when the two-dimensional code 1 is used as a coupon, the control unit 17 uses the communication unit 16 to access the URL read from the two-dimensional code 1, and from the URL server to the coupon Get display data. The user can use the two-dimensional code 1 as a coupon by displaying an image based on the coupon display data on the display unit 13 and presenting the image to the service provider.
その後、本フローチャートにおける二次元コード1の読取処理は終了する。
Thereafter, the reading process of the two-dimensional code 1 in this flowchart ends.
なお、二次元コード1から読み取られたURLのサーバでは、例えば一度ポイントが加算された二次元コード1のID(Identification Data)などを記憶しておき、同じ二次元コード1から複数回ポイントが加算されることを防止するための管理がされてもよい。
Note that the URL server read from the two-dimensional code 1 stores, for example, the ID (Identification) Data) of the two-dimensional code 1 once added with the points, and the points are added a plurality of times from the same two-dimensional code 1. Management may be performed to prevent this from happening.
以上説明したように、本実施形態に係る二次元コード1の読取装置10は、クワイエットゾーン3に不可視インクで記された認証コード4が付された二次元コード1を読み取ることができる。このとき、読取装置10は、認証コード4から読み取られた認証情報と二次元コード1から読み取られた情報の全部又は一部とが合致しないと、二次元コード1から読み取られた情報に基づいた処理を実行しない。そのため、複製され、正しい認証コード4を有さない二次元コード1からは、処理が実行されない。その結果、金券やポイント券に使用される二次元コード1が複製によって不正に使用されることを防止することができる。
As described above, the two-dimensional code 1 reading device 10 according to this embodiment can read the two-dimensional code 1 with the authentication code 4 written in invisible ink in the quiet zone 3. At this time, if the authentication information read from the authentication code 4 does not match all or part of the information read from the two-dimensional code 1, the reading device 10 is based on the information read from the two-dimensional code 1. Do not execute processing. Therefore, the process is not executed from the two-dimensional code 1 that is duplicated and does not have the correct authentication code 4. As a result, it is possible to prevent the two-dimensional code 1 used for a gold ticket or a point ticket from being illegally used by duplication.
なお、本実施形態では、認証コード4は、この認証コード4が付された二次元コード1に含まれる情報と合致する認証情報を有していた。このとき、合致の条件である認証情報と二次元コード1の情報との対応関係が、例えば図5に示すように、予め読取装置10の記憶部14に記憶されていてもよい。
In the present embodiment, the authentication code 4 has authentication information that matches the information included in the two-dimensional code 1 to which the authentication code 4 is attached. At this time, the correspondence relationship between the authentication information that is the matching condition and the information of the two-dimensional code 1 may be stored in advance in the storage unit 14 of the reading device 10 as illustrated in FIG. 5, for example.
図5において、認証情報A、認証情報B、認証情報C、・・・は、それぞれ、二次元コードに含まれる情報A’、二次元コードに含まれる情報B’、二次元コードに含まれる情報C’、・・・に対応付けられる。このように、記憶部14は、二次元コード読取部11が読み取り可能な二次元コード1のそれぞれについて、二次元コード1に含まれる比較対象の情報と、この二次元コード1に付された認証コード4が示す認証情報と、を対応付けて記憶する。そして、制御部17は、記憶された対応関係にある認証情報と二次元コード1からの情報が読み取られた場合に、両者が合致すると判別する。
In FIG. 5, authentication information A, authentication information B, authentication information C,... Are information A ′ included in the two-dimensional code, information B ′ included in the two-dimensional code, and information included in the two-dimensional code, respectively. Corresponding to C ′,. As described above, the storage unit 14 includes, for each of the two-dimensional codes 1 that can be read by the two-dimensional code reading unit 11, information to be compared included in the two-dimensional code 1 and authentication attached to the two-dimensional code 1. The authentication information indicated by the code 4 is stored in association with each other. And the control part 17 discriminate | determines that both correspond, when the authentication information and the information from the two-dimensional code 1 which are stored correspond are read.
あるいは別の例として、二次元コード1と認証コード4とがそれぞれ認証のための数字データを有し、二次元コード1から読み取られた数字と認証コード4から読み取られた数字の和や積などの演算結果が所定の数に一致する場合に、上記合致の条件が満たされるとしてもよい。
Alternatively, as another example, the two-dimensional code 1 and the authentication code 4 each have numeric data for authentication, and the sum or product of the number read from the two-dimensional code 1 and the number read from the authentication code 4 The above-mentioned matching condition may be satisfied when the result of the calculation matches a predetermined number.
[第2の実施形態]
続いて、本発明の第2の実施形態について、以下説明する。 [Second Embodiment]
Next, a second embodiment of the present invention will be described below.
続いて、本発明の第2の実施形態について、以下説明する。 [Second Embodiment]
Next, a second embodiment of the present invention will be described below.
本実施形態の読取装置10は、実施形態1の読取装置10と同様、二次元コード読取部11と、認証コード読取部12と、表示部13と、記憶部14と、操作部15と、通信部16と、制御部17と、を備える。また、本実施形態の読取装置10が読み取る二次元コード1は、実施形態1の二次元コード1と同様、マトリクス状に配置された複数のセルによって各種情報を表現する。また、二次元コード1のクワイエットゾーン3には、複製防止のための認証コード4が不可視インクで記される。
Similar to the reading device 10 of the first embodiment, the reading device 10 of the present embodiment includes a two-dimensional code reading unit 11, an authentication code reading unit 12, a display unit 13, a storage unit 14, an operation unit 15, and communication. Unit 16 and control unit 17. In addition, the two-dimensional code 1 read by the reading device 10 according to the present embodiment expresses various types of information by a plurality of cells arranged in a matrix like the two-dimensional code 1 according to the first embodiment. Further, in the quiet zone 3 of the two-dimensional code 1, an authentication code 4 for preventing duplication is written in invisible ink.
一方で、本実施形態の二次元コード1は、汎用の二次元コードリーダで読み取られることがないよう、暗号化がされる。例えば、二次元コード1が有する情報が、所定の復号キーでのみ復号可能な変換アルゴリズムで変換され、読取装置10以外の装置では読み取り不能にするなどの保護処理がされる。そして、認証コード4は、暗号化された二次元コード1を復号するための情報を有する。
On the other hand, the two-dimensional code 1 of the present embodiment is encrypted so as not to be read by a general-purpose two-dimensional code reader. For example, the information included in the two-dimensional code 1 is converted by a conversion algorithm that can be decrypted only with a predetermined decryption key, and a protection process is performed such that the information cannot be read by devices other than the reader 10. The authentication code 4 has information for decrypting the encrypted two-dimensional code 1.
図6は、本実施形態に係る二次元コード1の読取処理の一例を示すフローチャートである。
FIG. 6 is a flowchart showing an example of the reading process of the two-dimensional code 1 according to the present embodiment.
読取装置10では、まず制御部17が、二次元コード1の読取スイッチが押されたか否かを判別する(ステップS21)。すなわち、制御部17は、ユーザから操作部15が操作され、二次元コード1を読み取る旨の指示が入力されたか否かを判別する。
In the reading apparatus 10, first, the control unit 17 determines whether or not the reading switch of the two-dimensional code 1 is pressed (step S21). That is, the control unit 17 determines whether or not the operation unit 15 is operated by the user and an instruction to read the two-dimensional code 1 is input.
読取スイッチが押されていないと判別されると(ステップS21;No)、処理はステップS1に留まる。すなわち、制御部17は、引き続き読取スイッチが押されたか否かを判別し、読取スイッチが押されるまで待機する。
If it is determined that the reading switch has not been pressed (step S21; No), the process remains at step S1. That is, the control unit 17 determines whether or not the reading switch is continuously pressed, and waits until the reading switch is pressed.
一方、読取スイッチが押されたと判別されると(ステップS21;Yes)、制御部17は、認証コード読取部12を用いて、赤外線による撮影画像を取得する(ステップS22)。すなわち、ユーザにより読取スイッチが押されると、制御部17は、まず認証コード4を読み取るため、赤外線による撮影画像を取得する。具体的に制御部17は、認証コード読取部12の赤外線カメラの視野内に収まった現実世界の様子を表す赤外線画像を生成し、生成した画像データを例えばRAMに保持する。
On the other hand, if it is determined that the reading switch has been pressed (step S21; Yes), the control unit 17 uses the authentication code reading unit 12 to acquire a photographed image using infrared rays (step S22). That is, when the reading switch is pressed by the user, the control unit 17 first acquires a photographed image by infrared rays in order to read the authentication code 4. Specifically, the control unit 17 generates an infrared image representing the state of the real world within the field of view of the infrared camera of the authentication code reading unit 12, and stores the generated image data in, for example, a RAM.
赤外線による撮影画像を取得すると、制御部17は、取得した撮影画像内に認証コード4があるか否かを判別する(ステップS23)。具体的に、制御部17は、撮影された画像データを検索し、認証コード4が有するクワイエットゾーン6や位置決めシンボル5に対応する画像があるか否かを判別する。これにより、制御部17は、撮影された赤外線画像データ内に認証コード4があるか否かを判別する。
When acquiring the captured image by infrared rays, the control unit 17 determines whether or not the authentication code 4 is present in the acquired captured image (step S23). Specifically, the control unit 17 searches the captured image data and determines whether there is an image corresponding to the quiet zone 6 or the positioning symbol 5 included in the authentication code 4. Thereby, the control part 17 discriminate | determines whether the authentication code 4 exists in the image | photographed infrared image data.
認証コード4がないと判別されると(ステップS23;No)、すなわち、認証コード4が検出されないと、制御部17は、表示部13を用いて、二次元コード1を読み取れない旨を表示する(ステップS24)。そして、本フローチャートにおける二次元コード1の読取処理は終了する。すなわち、複製された二次元コード1が読み取られないようにするため、制御部17は、撮影された赤外線画像データ内に認証コード4が見つけられない場合には、たとえ二次元コード1が二次元コード読取部11のカメラの視野内にあったとしても、二次元コード1を読み取る処理は行わない。
If it is determined that there is no authentication code 4 (step S23; No), that is, if the authentication code 4 is not detected, the control unit 17 uses the display unit 13 to display that the two-dimensional code 1 cannot be read. (Step S24). And the reading process of the two-dimensional code 1 in this flowchart is complete | finished. That is, in order to prevent the duplicated two-dimensional code 1 from being read, the control unit 17 determines that the two-dimensional code 1 is two-dimensional if the authentication code 4 cannot be found in the captured infrared image data. Even if the code reader 11 is within the field of view of the camera, the process of reading the two-dimensional code 1 is not performed.
一方、認証コード4があると判別されると(ステップS23;Yes)、すなわち、認証コード4が検出されると、制御部17は、画像データ内の認証コード4を読み取り(ステップS25)、二次元コード1の復号キーを取得する(ステップS26)。すなわち、認証コード4は、この認証コード4が付された二次元コード1の復号キーの情報を、そのセルの分布パターンによって示す。制御部17は、画像データ内のクワイエットゾーン6や位置決めシンボル5のデータから認証コード4の向きや大きさを求め、認証コード4を構成する複数のセルの分布パターンが表現する情報を読み取ることで、二次元コード1の復号キーを取得する。
On the other hand, if it is determined that the authentication code 4 is present (step S23; Yes), that is, if the authentication code 4 is detected, the control unit 17 reads the authentication code 4 in the image data (step S25). A decryption key of dimension code 1 is acquired (step S26). That is, the authentication code 4 indicates the information of the decryption key of the two-dimensional code 1 to which the authentication code 4 is attached by the cell distribution pattern. The control unit 17 obtains the direction and size of the authentication code 4 from the data of the quiet zone 6 and the positioning symbol 5 in the image data, and reads information expressed by a distribution pattern of a plurality of cells constituting the authentication code 4. The decryption key of the two-dimensional code 1 is acquired.
二次元コード1の復号キーを取得すると、制御部17は、二次元コード読取部11を用いて、通常のカメラによる撮影画像を取得する(ステップS27)。すなわち、制御部17は、二次元コード1を検出し、二次元コード1が示す情報を読み取るため、可視光による撮影画像を取得する。具体的に制御部17は、二次元コード読取部11のカメラの視野内に収まった現実世界の様子を表す画像を生成し、生成した画像データを例えばRAMに保持する。
When the two-dimensional code 1 decryption key is acquired, the control unit 17 uses the two-dimensional code reading unit 11 to acquire a photographed image by a normal camera (step S27). That is, the control unit 17 detects the two-dimensional code 1 and reads the information indicated by the two-dimensional code 1, and thus acquires a captured image using visible light. Specifically, the control unit 17 generates an image representing the state of the real world within the field of view of the camera of the two-dimensional code reading unit 11, and holds the generated image data in, for example, a RAM.
撮影画像を取得すると、制御部17は、撮影画像内の二次元コード1を読み取る(ステップS28)。具体的に制御部17は、画像データ内のクワイエットゾーン3及び位置決めシンボル2a、2b、及び2cを検出し、検出したクワイエットゾーン3及び位置決めシンボル2a、2b、及び2cのデータから二次元コード1の向きや大きさを求める。そして、制御部17は、二次元コード1を構成する複数のセルの分布パターンが表現する情報を読み取る。
When the captured image is acquired, the control unit 17 reads the two-dimensional code 1 in the captured image (step S28). Specifically, the control unit 17 detects the quiet zone 3 and the positioning symbols 2a, 2b, and 2c in the image data, and the two-dimensional code 1 is detected from the data of the detected quiet zone 3 and the positioning symbols 2a, 2b, and 2c. Find the direction and size. Then, the control unit 17 reads information expressed by a distribution pattern of a plurality of cells constituting the two-dimensional code 1.
二次元コード1を読み取ると、制御部17は、読み取った二次元コード1の情報を復号する(ステップS29)。すなわち、二次元コード1は、汎用の二次元コードリーダで読み取られることがないよう、暗号化がされている。制御部17は、二次元コード1から読み取った暗号化された情報を、上記ステップS26で取得した復号キーを用いて、復号する。
When the two-dimensional code 1 is read, the control unit 17 decodes the read information of the two-dimensional code 1 (step S29). That is, the two-dimensional code 1 is encrypted so as not to be read by a general-purpose two-dimensional code reader. The control unit 17 decrypts the encrypted information read from the two-dimensional code 1 using the decryption key acquired in step S26.
読み取った情報を復号すると、制御部17は、復号した二次元コード1の情報に基づいた処理を実行する(ステップS30)。その後、本フローチャートにおける二次元コード1の読取処理は終了する。
When the read information is decoded, the control unit 17 executes a process based on the decoded information of the two-dimensional code 1 (step S30). Then, the reading process of the two-dimensional code 1 in this flowchart is complete | finished.
以上説明したように、本実施形態に係る二次元コード1の読取装置10は、クワイエットゾーン3に不可視インクで記された認証コード4から二次元コード1の復号キーを取得し、この復号キーを用いることで二次元コード1から情報を読み取る。そのため、複製され、正しい認証コード4を有さない二次元コード1からは復号キーが取得されないため、情報が読み取られない。その結果、金券やポイント券に使用される二次元コード1が複製によって不正に使用されることを防止することができる。
As described above, the two-dimensional code 1 reading device 10 according to the present embodiment acquires the decryption key of the two-dimensional code 1 from the authentication code 4 written with invisible ink in the quiet zone 3, and uses this decryption key. By using it, information is read from the two-dimensional code 1. Therefore, since the decryption key is not acquired from the two-dimensional code 1 that is duplicated and does not have the correct authentication code 4, information is not read. As a result, it is possible to prevent the two-dimensional code 1 used for a gold ticket or a point ticket from being illegally used by duplication.
なお、本実施形態では、二次元コード1の復号キーの情報は、この二次元コード1に付された認証コード4に含まれていた。しかし、本発明における復号キーは、読取装置10の記憶部14に記憶されていてもよい。この場合、例えば図7に示すように、記憶部14は、認証情報と、二次元コード1の復号キーと、を対応付けて記憶する。
In the present embodiment, the decryption key information of the two-dimensional code 1 is included in the authentication code 4 attached to the two-dimensional code 1. However, the decryption key in the present invention may be stored in the storage unit 14 of the reading device 10. In this case, for example, as illustrated in FIG. 7, the storage unit 14 stores the authentication information and the decryption key of the two-dimensional code 1 in association with each other.
図7において、認証情報X、認証情報Y、認証情報Z、・・・は、それぞれ、二次元コードX、二次元コードY、二次元コードZ、・・・に付された認証コード4が示す認証情報である。すなわち、二次元コードXを読み取るための復号キーは、この二次元コードXに付された認証コード4が示す認証情報Xに対応付けられ、二次元コードYを読み取るための復号キーは、この二次元コードYに付された認証コード4が示す認証情報Yに対応付けられ、二次元コードZを読み取るための復号キーは、この二次元コードZに付された認証コード4が示す認証情報Zに対応付けられる。
In FIG. 7, authentication information X, authentication information Y, authentication information Z,... Are indicated by authentication code 4 attached to two-dimensional code X, two-dimensional code Y, two-dimensional code Z,. Authentication information. That is, the decryption key for reading the two-dimensional code X is associated with the authentication information X indicated by the authentication code 4 attached to the two-dimensional code X, and the decryption key for reading the two-dimensional code Y is The decryption key for reading the two-dimensional code Z, which is associated with the authentication information Y indicated by the authentication code 4 attached to the dimension code Y, is stored in the authentication information Z indicated by the authentication code 4 attached to the two-dimensional code Z. It is associated.
このように図7の例では、記憶部14は、二次元コード読取部11によって読み取り可能な二次元コード1のそれぞれについて、二次元コード1の復号キーのデータを、この二次元コード1に付された認証コード4から読み取られる認証情報に対応付けて記憶する。そして、制御部17は、認証コード読取部12によって認証コード4を読み取ると、読み取られた認証情報に予め対応付けられて記憶された復号キーを取得する。
As described above, in the example of FIG. 7, the storage unit 14 attaches the decryption key data of the two-dimensional code 1 to the two-dimensional code 1 for each of the two-dimensional codes 1 that can be read by the two-dimensional code reading unit 11. Stored in association with the authentication information read from the authentication code 4 that has been read. Then, when the authentication code reading unit 12 reads the authentication code 4, the control unit 17 obtains a decryption key stored in association with the read authentication information in advance.
なお、本発明は、上記実施形態に限定されず、種々の変形、応用が可能である。また、上述した実施形態の各構成要素を自由に組み合わせることも可能である。以下、本発明に適用可能な上記実施形態の変形態様について、説明する。
In addition, this invention is not limited to the said embodiment, A various deformation | transformation and application are possible. Moreover, it is also possible to freely combine the constituent elements of the above-described embodiments. Hereinafter, modifications of the above-described embodiment applicable to the present invention will be described.
例えば、上記実施形態では、二次元コード1から読み取られた情報の処理は、認証コード読取部12によって認証コード4が検出され、かつ、さらに認証コード4から読み取られた認証情報によって適切に認証された場合に、実行された。しかし、より処理を簡素化するため、認証コード4から読み取られた認証情報による認証処理は省かれてもよい。
For example, in the above-described embodiment, the processing of the information read from the two-dimensional code 1 is appropriately authenticated by the authentication code 4 detected by the authentication code reading unit 12 and further by the authentication information read from the authentication code 4. If executed. However, in order to further simplify the processing, the authentication processing using the authentication information read from the authentication code 4 may be omitted.
具体的に説明すると、認証コード読取部12によって認証コード4が検出されると、二次元コード読取部11によって二次元コード1が読み取られ、認証コード4に含まれる認証情報によらずに処理が実行されるようにしてもよい。このような構成により、より簡易な手段によって二次元コード1の複製を防止することができる。
More specifically, when the authentication code reading unit 12 detects the authentication code 4, the two-dimensional code reading unit 11 reads the two-dimensional code 1, and the process is performed regardless of the authentication information included in the authentication code 4. It may be executed. With such a configuration, duplication of the two-dimensional code 1 can be prevented by simpler means.
また、上記実施形態では、認証コード4から読み取られた認証情報によって適切に認証がされない限り、二次元コード1が示す情報の処理がされなかった。しかし、例えば二次元コード1が所定のURL情報を表現する場合、認証コード4から読み取られた認証情報をそのURLサーバに送信し、サーバにおいて認証処理がされるようにしてもよい。
In the above embodiment, the information indicated by the two-dimensional code 1 is not processed unless it is properly authenticated by the authentication information read from the authentication code 4. However, for example, when the two-dimensional code 1 represents predetermined URL information, the authentication information read from the authentication code 4 may be transmitted to the URL server, and the authentication process may be performed in the server.
例えば、二次元コード1が示すURLのサーバにおいて、認証コード4から読み取られた認証情報と二次元コード1の情報とが比較され、両者が合致する場合に、例えばポイントが加算されるような所定の処理が実行されるようにしてもよい。あるいは、二次元コード1が示すURLのサーバにおいて、認証コード4から読み取られた認証情報に対応付けられた復号キーが取得され、この復号キーがないとポイント加算などの処理が実行されないように制限がかけられるようにしてもよい。
For example, in the server of the URL indicated by the two-dimensional code 1, the authentication information read from the authentication code 4 is compared with the information of the two-dimensional code 1, and if both match, for example, a predetermined point is added such that points are added. These processes may be executed. Alternatively, in the server of the URL indicated by the two-dimensional code 1, a decryption key associated with the authentication information read from the authentication code 4 is acquired, and processing such as point addition is not performed without this decryption key May be applied.
また、認証コード4は、複数あってもよい。そして、所定数以上の認証コード4が検出された場合に、二次元コード1の読み取り処置が実行されるようにしてもよい。
Also, there may be a plurality of authentication codes 4. Then, when a predetermined number or more of authentication codes 4 are detected, the reading process of the two-dimensional code 1 may be executed.
図8は、クワイエットゾーン3の四隅に4つの認証コード4が記された二次元コード1の例を示す図である。
FIG. 8 is a diagram showing an example of the two-dimensional code 1 in which four authentication codes 4 are written at the four corners of the quiet zone 3.
制御部17は、認証コード読取部12によって4つの認証コード4のそれぞれを検出する。具体的に説明すると、制御部17は、四隅に記された4つの認証コード4のそれぞれについて、認証コード読取部12を用いて1つずつ認証コード4を検出する。あるいは、制御部17は、四隅に記された4つの認証コード4がすべて含まれるような視野をもつ認証コード読取部12によって1つの赤外線画像を取得し、その赤外線画像の中から4つの認証コード4を検出するようにしてもよい。
The control unit 17 detects each of the four authentication codes 4 by the authentication code reading unit 12. More specifically, the control unit 17 detects the authentication codes 4 one by one using the authentication code reading unit 12 for each of the four authentication codes 4 marked at the four corners. Alternatively, the control unit 17 acquires one infrared image by the authentication code reading unit 12 having a field of view in which all four authentication codes 4 written at the four corners are included, and four authentication codes are extracted from the infrared images. 4 may be detected.
そして、制御部17は、所定数以上の認証コード4が検出された場合に、二次元コード1の読み取り処理を行う。このとき、4つすべての認証コード4が検出されない限り、二次元コード1の読み取り処理がされないようにしてもよいし、例えば1つや2つ、3つなどのような予め設定された個数以上の認証コード4が検出された場合に二次元コード1の読み取り処理が実行されるようにしてもよい。
And the control part 17 performs the reading process of the two-dimensional code 1 when the authentication code 4 more than a predetermined number is detected. At this time, the reading process of the two-dimensional code 1 may not be performed unless all four authentication codes 4 are detected, or more than a predetermined number such as one, two, three, etc. When the authentication code 4 is detected, the reading process of the two-dimensional code 1 may be executed.
また、二次元コード1の複製防止の程度をより高めるために、制御部17は、検出された複数の認証コード4から認証情報を読み取り、読み取った認証情報が以下に述べるような所定の条件を満たす場合に二次元コード1を読み取るようにしてもよい。
In order to further increase the degree of prevention of duplication of the two-dimensional code 1, the control unit 17 reads the authentication information from the plurality of detected authentication codes 4, and the read authentication information satisfies predetermined conditions as described below. If it is satisfied, the two-dimensional code 1 may be read.
例えば、4つの認証コード4には互いに合致する認証情報が含まれ、制御部17が、検出された4つの認証コード4に含まれる認証情報を互いに比較してもよい。そして、4つの認証情報が合致することを、二次元コード1の情報を読み取るための条件にしてもよい。あるいは、制御部17は、検出された認証コード4の認証情報と二次元コード1の情報とを比較し、認証情報が二次元コード1の情報の全部又は一部と合致した場合に、二次元コード1の情報を読み取り結果として取得するようにしてもよい。このときの合致の条件は、上記実施形態1と同様に、4つの認証情報が互いに同一又は対応するものである場合に満たされるようにすることができる。
For example, the four authentication codes 4 may include mutually matching authentication information, and the control unit 17 may compare the authentication information included in the detected four authentication codes 4 with each other. And it may be set as a condition for reading the information of the two-dimensional code 1 that the four pieces of authentication information match. Alternatively, the control unit 17 compares the detected authentication information of the authentication code 4 with the information of the two-dimensional code 1, and if the authentication information matches all or part of the information of the two-dimensional code 1, the control unit 17 You may make it acquire the information of code | cord | chord 1 as a reading result. The matching condition at this time can be satisfied when the four pieces of authentication information are the same or correspond to each other, as in the first embodiment.
また、4つの認証コード4が有する認証情報のそれぞれは、二次元コード1の復号キーのデータを部分的に含み、制御部17が、認証コード読取部12によって読み取られた4つの認証情報をあわせることで1つの復号キーを取得するようにしてもよい。そして、4つの認証コード4から復号キーを取得できたことを、二次元コード1の情報を読み取るための条件にしてもよい。
Each of the authentication information included in the four authentication codes 4 partially includes the decryption key data of the two-dimensional code 1, and the control unit 17 combines the four authentication information read by the authentication code reading unit 12. Thus, one decryption key may be acquired. The fact that the decryption key can be acquired from the four authentication codes 4 may be a condition for reading the information of the two-dimensional code 1.
あるいは、4つの認証情報の組合せと二次元コード1の復号キーとが対応付けられて記憶部14などに予め記憶され、制御部17が、認証コード読取部12によって読み取られた4つの認証情報を組み合わせ、その組合せに対応付けられて記憶された復号キーを取得するようにしてもよい。そして、4つの認証情報の組合せに対応付けられた復号キーを取得できたことを、二次元コード1の情報を読み取るための条件にしてもよい。
Alternatively, the combination of the four authentication information and the decryption key of the two-dimensional code 1 are associated with each other and stored in advance in the storage unit 14 or the like, and the control unit 17 reads the four authentication information read by the authentication code reading unit 12. A combination and a decryption key stored in association with the combination may be acquired. Then, a condition for reading the information of the two-dimensional code 1 may be that the decryption key associated with the combination of the four pieces of authentication information can be acquired.
このように複数の認証コード4が二次元コード1に記されるようにすることで、認証コード4が1つしかない場合に比べて、二次元コード1の複製をより確実に防止することができる。
By making a plurality of authentication codes 4 written on the two-dimensional code 1 in this way, it is possible to more reliably prevent duplication of the two-dimensional code 1 compared to the case where there is only one authentication code 4. it can.
また、上記実施形態では、認証コード4は、二次元コード1のクワイエットゾーン3内に収まるように配置された。しかし、本発明における認証コード4は、適切に読み取られることが可能であるなら、例えばクワイエットゾーン3よりも外側であっても、どのような位置に配置されてもよい。もちろん、読取装置10が二次元コード1と認証コード4との双方を適切に読み取るためには、認証コード4は、なるべく二次元コード1の近くに配置されることが好ましい。
Further, in the above embodiment, the authentication code 4 is arranged so as to be within the quiet zone 3 of the two-dimensional code 1. However, the authentication code 4 in the present invention may be arranged at any position, for example, outside the quiet zone 3 as long as it can be read appropriately. Of course, in order for the reading device 10 to appropriately read both the two-dimensional code 1 and the authentication code 4, the authentication code 4 is preferably arranged as close to the two-dimensional code 1 as possible.
また、例えば図9に示すように、認証コード4は、二次元コード1が記された領域とクワイエットゾーン3との双方にまたがるように配置されてもよい。この場合、認証コード4は可視光を透過するインクで記されるため、二次元コード1の上から重ねて記されても、二次元コード読取部11が二次元コード1を読み取る妨げとはならない。同様に、認証コード読取部12が二次元コード1からの可視光に妨げられずに認証コード4からの赤外線を適切に読み取ることができれば、認証コード4が二次元コード1と重なる位置に記されていても、適切に認証コード4を読み取ることができる。
For example, as shown in FIG. 9, the authentication code 4 may be arranged so as to extend over both the area where the two-dimensional code 1 is written and the quiet zone 3. In this case, since the authentication code 4 is written in ink that transmits visible light, even if the authentication code 4 is written over the two-dimensional code 1, it does not prevent the two-dimensional code reading unit 11 from reading the two-dimensional code 1. . Similarly, if the authentication code reading unit 12 can appropriately read the infrared rays from the authentication code 4 without being obstructed by the visible light from the two-dimensional code 1, the authentication code 4 is written at a position overlapping the two-dimensional code 1. Even if it is, the authentication code 4 can be read appropriately.
また、本発明の認証コードは、一次元状のコードであってもよい。例えば図10に示すように、認証コードは、二次元コード1のクワイエットゾーン3の一辺に渡って、不可視インクで記された認証コード7のようなものであってもよい。この他、本発明の認証コードは、所定の認証情報を、認証コード読取部12が読み取り可能に表現することができるものであれば、文字、記号、図形、模様、適宜の画像等から構成されていてもよい。
Further, the authentication code of the present invention may be a one-dimensional code. For example, as shown in FIG. 10, the authentication code may be an authentication code 7 written in invisible ink over one side of the quiet zone 3 of the two-dimensional code 1. In addition, the authentication code of the present invention includes characters, symbols, figures, patterns, appropriate images, etc., as long as the predetermined authentication information can be expressed by the authentication code reader 12. It may be.
また、二次元コード1は、ロゴが重ねられて表示されるものであってもよい。すなわち、図1に示されたような明度の分布パターンをもつ複数のセル上に、図形、文字、記号、絵などのロゴが重ねてデザインされてもよい。
Further, the two-dimensional code 1 may be displayed with a logo superimposed thereon. That is, a logo such as a figure, a character, a symbol, or a picture may be designed on a plurality of cells having a lightness distribution pattern as shown in FIG.
具体的に図11の例では、「3ポイント」との文字を視認可能に表現するロゴが二次元コード1に重ねられて表示されている。このようなロゴは、ロゴのうち所定明度以上の領域に所定明度未満の円形のセル(この例では黒色のセル)を重ね合わせる一方で、ロゴのうち所定明度未満の領域に所定明度以上の円形のセル(この例では白色のセル)を重ね合わせることによって形成される。
Specifically, in the example of FIG. 11, a logo expressing the characters “3 points” so as to be visible is superimposed on the two-dimensional code 1 and displayed. Such logos overlap circular cells with less than a predetermined brightness (black cells in this example) on areas of the logo that have a predetermined brightness or higher, while circles with a predetermined brightness or higher in the logo with a predetermined brightness. Are formed by overlapping the cells (in this example, white cells).
ロゴが重ねられた二次元コード1では、ロゴのうち所定明度未満の領域及び所定明度未満のセルと、ロゴのうち所定明度以上の領域及び所定明度以上のセルと、の分布パターンによって、各種情報が表現される。このようなロゴが重ねられた二次元コード1は、偽造防止の観点から、フルカラーであることが好ましいが、グレースケールであってもよい。なお、ロゴを表すためのセルの形状は、任意であり、円形であってもよいし、多角形や星形などであってもよい。
In the two-dimensional code 1 on which the logo is superimposed, various types of information can be obtained depending on the distribution pattern of the area below the predetermined brightness and the cells below the predetermined brightness in the logo, and the area above the predetermined brightness and the cells above the predetermined brightness in the logo. Is expressed. The two-dimensional code 1 on which such a logo is superimposed is preferably full color from the viewpoint of preventing forgery, but may be gray scale. The shape of the cell for representing the logo is arbitrary, and may be a circle, a polygon, a star, or the like.
このように、二次元コード1が有するポイント数をロゴで表現することで、二次元コード1に含まれる情報内容がユーザに認識可能となる。また、ポイント数のロゴに限らず、例えばポイント発行券を扱う企業のロゴが二次元コード1上に重ねられてデザインされてもよい。これにより、二次元コード1の視認性や意匠性を高めることができる。
Thus, by expressing the number of points of the two-dimensional code 1 with a logo, the information content included in the two-dimensional code 1 can be recognized by the user. Moreover, the logo of the number of points is not limited, and a logo of a company that handles point issuance tickets may be designed to be superimposed on the two-dimensional code 1. Thereby, the visibility and designability of the two-dimensional code 1 can be enhanced.
また、ロゴが重ねられた二次元コード1は、所定明度未満のロゴマークに、所定明度以上の円形のセル(この例では白色のセル)を重ね合わせて形成され、セルと、ロゴマークのうちセルが重ね合わされていない部分と、の分布パターンによって、各種情報が表現されるようにしてもよい。
In addition, the two-dimensional code 1 on which the logo is superimposed is formed by superimposing a circular cell (in this example, a white cell) with a predetermined brightness or higher on a logo mark with a predetermined brightness or lower. Various types of information may be expressed by the distribution pattern of the portion where the cells are not overlapped.
また、二次元コード1には、発行された日時の情報や管理番号等、その二次元コード1に固有の情報が埋め込まれるようにしてもよい。これにより、同じポイント数を表現する複数の二次元コード1があった場合でも、1つ1つの二次元コード1を区別することができるようになる。そのため、二次元コード1の複製防止の程度をさらに高めることができる。
Further, in the two-dimensional code 1, information unique to the two-dimensional code 1, such as information on the date and time of issue and a management number, may be embedded. Thereby, even when there are a plurality of two-dimensional codes 1 expressing the same number of points, each two-dimensional code 1 can be distinguished. Therefore, the degree of prevention of duplication of the two-dimensional code 1 can be further increased.
また、上記実施形態では、二次元コード1がQRコード(登録商標)であるものとして説明したが、本発明はこれに限定されるものではなく、二次元コード1は、データマトリクスや、アズテックコード、コードワン、アレイタグ、ボックス図形コード、マキシコード、ペリコード、ソフトストリップ、CPコード、カルラコード、ウルトラコードなどといった他のマトリクス式の二次元コードであってもよい。あるいは、PDF417、コード49、コード16k、コーダブロックなどといった一次元コードを縦に積み重ねたスタック式の二次元コードであっても構わない。
In the above embodiment, the two-dimensional code 1 is described as a QR code (registered trademark). However, the present invention is not limited to this, and the two-dimensional code 1 may be a data matrix, an aztec code, or the like. Other matrix type two-dimensional codes such as code one, array tag, box graphic code, maxi code, peri code, soft strip, CP code, carla code, and ultra code may be used. Alternatively, a stack type two-dimensional code in which one-dimensional codes such as PDF417, code 49, code 16k, and coder block are vertically stacked may be used.
また、上記実施形態において、CPUが実行するプログラムは、予めROMや記憶部14などに記憶されるものとして説明したが、本発明はこれに限定されるものではなく、上述の処理を実行させるためのプログラムを、既存の汎用コンピュータに適用することで、上記実施形態に係る読取装置10として機能させてもよい。
In the above-described embodiment, the program executed by the CPU has been described as being stored in advance in the ROM, the storage unit 14 or the like. However, the present invention is not limited to this, and is for executing the above-described processing. The above program may be applied to an existing general-purpose computer so as to function as the reading device 10 according to the above-described embodiment.
このようなプログラムの提供方法は任意であり、例えばコンピュータが読取可能な非一時的な記録媒体(フレキシブルディスク、CD(Compact Disc)-ROM、DVD(Digital Versatile Disc)-ROMなど)に格納して配布してもよいし、インターネットなどのネットワーク上のストレージにプログラムを格納しておき、これをダウンロードさせることにより提供してもよい。
Such a program can be provided by any method, for example, stored in a computer-readable non-transitory recording medium (flexible disk, CD (Compact Disc) -ROM, DVD (Digital Versatile Disc) -ROM, etc.). The program may be distributed, or may be provided by storing the program in a storage on a network such as the Internet and downloading it.
さらに、上記の処理をOSとアプリケーションプログラムとの分担、又はOSとアプリケーションプログラムとの協働によって実行する場合には、アプリケーションプログラムのみを記録媒体やストレージに格納してもよい。また、搬送波にプログラムを重畳し、ネットワークを介して配信することも可能である。例えば、ネットワーク上の掲示板(BBS:Bulletin Board System)に上記プログラムを掲示し、ネットワークを介してプログラムを配信してもよい。そして、このプログラムを起動し、OSの制御下で、他のアプリケーションプログラムと同様に実行することにより、上記の処理を実行できるように構成してもよい。
Furthermore, when the above processing is executed by sharing between the OS and the application program or by cooperation between the OS and the application program, only the application program may be stored in a recording medium or storage. It is also possible to superimpose a program on a carrier wave and distribute it via a network. For example, the program may be posted on a bulletin board (BBS: Bulletin Board System) on the network, and the program may be distributed via the network. Then, this program may be activated and executed in the same manner as other application programs under the control of the OS, so that the above processing can be executed.
1 二次元コード
2a、2b、2c、5 位置決めシンボル
3、6 クワイエットゾーン
4、7 認証コード
10 読取装置
11 二次元コード読取部
12 認証コード読取部
13 表示部
14 記憶部
15 操作部
16 通信部
17 制御部 DESCRIPTION OFSYMBOLS 1 Two- dimensional code 2a, 2b, 2c, 5 Positioning symbol 3, 6 Quiet zone 4, 7 Authentication code 10 Reader 11 Two-dimensional code reading part 12 Authentication code reading part 13 Display part 14 Storage part 15 Operation part 16 Communication part 17 Control unit
2a、2b、2c、5 位置決めシンボル
3、6 クワイエットゾーン
4、7 認証コード
10 読取装置
11 二次元コード読取部
12 認証コード読取部
13 表示部
14 記憶部
15 操作部
16 通信部
17 制御部 DESCRIPTION OF
Claims (10)
- 二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出手段と、
前記検出手段によって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取手段と、
を備える二次元コード読取装置。 Detection means for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
A reading means for reading information indicated by the two-dimensional code when the authentication code is detected by the detection means;
A two-dimensional code reader. - 前記読取手段は、
前記検出手段によって前記認証コードが検出された場合、該検出された認証コードが示す認証情報と、前記二次元コードが示す前記情報と、を比較する比較手段を含み、
前記比較手段による比較の結果、前記認証情報と前記二次元コードが示す前記情報の全部又は一部とが合致する場合、前記二次元コードが示す前記情報を読取結果として取得する、
ことを特徴とする請求項1に記載の二次元コード読取装置。 The reading means includes
A comparison means for comparing the authentication information indicated by the detected authentication code with the information indicated by the two-dimensional code when the authentication code is detected by the detection means;
As a result of comparison by the comparison means, when the authentication information and all or part of the information indicated by the two-dimensional code match, the information indicated by the two-dimensional code is acquired as a reading result;
The two-dimensional code reader according to claim 1. - 前記二次元コードが示す情報は暗号化され、
前記読取手段は、前記検出手段によって前記認証コードが検出された場合、前記二次元コードが示す前記暗号化された情報を該検出された認証コードが示す復号キーを用いて復号することによって、該暗号化された情報を読み取る、
ことを特徴とする請求項1に記載の二次元コード読取装置。 The information indicated by the two-dimensional code is encrypted,
When the detection unit detects the authentication code, the reading unit decrypts the encrypted information indicated by the two-dimensional code using a decryption key indicated by the detected authentication code, thereby Read encrypted information,
The two-dimensional code reader according to claim 1. - 前記二次元コードが示す情報は暗号化され、
前記読取手段が読み取り可能な二次元コードの復号キーのそれぞれを、該二次元コードに記された認証コードが示す認証情報に対応付けて記憶する記憶手段をさらに備え、
前記読取手段は、
前記検出手段によって前記認証コードが検出された場合、該検出された認証コードが示す認証情報に対応付けられて前記記憶手段に記憶された復号キーを取得する取得手段と、
前記二次元コードが示す前記暗号化された情報を前記取得された復号キーを用いて復号することによって、該暗号化された情報を読み取る復号手段と、
を含むことを特徴とする請求項1に記載の二次元コード読取装置。 The information indicated by the two-dimensional code is encrypted,
Storage means for storing each decryption key of the two-dimensional code readable by the reading means in association with authentication information indicated by the authentication code written in the two-dimensional code;
The reading means includes
An acquisition means for acquiring a decryption key stored in the storage means in association with authentication information indicated by the detected authentication code when the detection means is detected by the detection means;
Decrypting means for reading the encrypted information by decrypting the encrypted information indicated by the two-dimensional code using the acquired decryption key;
The two-dimensional code reader according to claim 1, comprising: - 前記二次元コードの位置から所定の範囲内には、前記認証コードが複数記され、
前記読取手段は、前記検出手段によって所定数以上の前記認証コードが検出された場合、前記二次元コードが示す前記情報を読み取る、
ことを特徴とする請求項1に記載の二次元コード読取装置。 Within a predetermined range from the position of the two-dimensional code, a plurality of the authentication codes are written,
The reading unit reads the information indicated by the two-dimensional code when the detection unit detects a predetermined number or more of the authentication codes;
The two-dimensional code reader according to claim 1. - 前記二次元コードの位置から所定の範囲内には、前記認証コードが複数記され、
前記読取手段は、前記検出手段によって検出された複数の認証コードが示す認証情報が所定の条件を満たす場合、前記二次元コードが示す前記情報を読取結果として取得する、
ことを特徴とする請求項1に記載の二次元コード読取装置。 Within a predetermined range from the position of the two-dimensional code, a plurality of the authentication codes are written,
The reading means acquires the information indicated by the two-dimensional code as a reading result when authentication information indicated by a plurality of authentication codes detected by the detection means satisfies a predetermined condition.
The two-dimensional code reader according to claim 1. - 前記認証コードは、前記二次元コードのクワイエットゾーンに記される、
ことを特徴とする請求項1に記載の二次元コード読取装置。 The authentication code is written in a quiet zone of the two-dimensional code.
The two-dimensional code reader according to claim 1. - 前記不可視インクは、赤外線インクである、
ことを特徴とする請求項1に記載の二次元コード読取装置。 The invisible ink is an infrared ink;
The two-dimensional code reader according to claim 1. - 二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出ステップと、
前記検出ステップによって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取ステップと、
を備える二次元コード読取方法。 A detection step of detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
A reading step of reading information indicated by the two-dimensional code when the authentication code is detected by the detection step;
A two-dimensional code reading method comprising: - コンピュータに、
二次元コードの位置から所定の範囲内に不可視インクで記された認証コードを検出する検出手順と、
前記検出手順によって前記認証コードが検出された場合、前記二次元コードが示す情報を読み取る読取手順と、
を実行させるためのプログラム。 On the computer,
A detection procedure for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code;
When the authentication code is detected by the detection procedure, a reading procedure for reading information indicated by the two-dimensional code;
A program for running
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2012/058425 WO2013145224A1 (en) | 2012-03-29 | 2012-03-29 | 2d code reading device, 2d code reading method, and program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2012/058425 WO2013145224A1 (en) | 2012-03-29 | 2012-03-29 | 2d code reading device, 2d code reading method, and program |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013145224A1 true WO2013145224A1 (en) | 2013-10-03 |
Family
ID=49258588
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/058425 WO2013145224A1 (en) | 2012-03-29 | 2012-03-29 | 2d code reading device, 2d code reading method, and program |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2013145224A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408499A (en) * | 2014-12-11 | 2015-03-11 | 中搜电子商务(北京)有限公司 | Product anti-counterfeiting system |
JP2015106847A (en) * | 2013-11-29 | 2015-06-08 | 共同印刷株式会社 | Decoding method, program, and system |
JP2016004533A (en) * | 2014-06-19 | 2016-01-12 | 株式会社デンソーウェーブ | Method of creating voucher, voucher, voucher reading system, and voucher utilization system |
US20160191376A1 (en) * | 2014-12-26 | 2016-06-30 | Fujitsu Limited | Information processing apparatus, information processing system, and communication device |
JP2016148932A (en) * | 2015-02-10 | 2016-08-18 | 株式会社東芝 | Ticket authenticity determination system, ticket issuing device, ticket examination device, ticket authenticity determination method and ticket |
CN112418881A (en) * | 2020-11-07 | 2021-02-26 | 许尧龙 | Two-dimensional code authentication coding method and traceability system |
US10979580B2 (en) * | 2019-02-27 | 2021-04-13 | Kyocera Document Solutions Inc. | Image processing apparatus capable of extending function, and image forming apparatus provided with the same |
JP2021167964A (en) * | 2016-10-07 | 2021-10-21 | 株式会社アーティエンス・ラボ | Information recognition method |
WO2023061374A1 (en) * | 2021-10-11 | 2023-04-20 | 宝洁公司 | Personal consumer product having secured content object |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002326443A (en) * | 2001-04-27 | 2002-11-12 | Seiko Epson Corp | Ink jet printing method and printed matter |
JP2005338669A (en) * | 2004-05-31 | 2005-12-08 | Dainippon Printing Co Ltd | Body and article for genuineness decision making, and genuineness deciding method thereof |
JP2006244097A (en) * | 2005-03-03 | 2006-09-14 | National Printing Bureau | Manufacturing method of and authentication method for authentication medium |
JP2007293836A (en) * | 2007-03-30 | 2007-11-08 | Denso Wave Inc | Method for reading information code printing medium and system for reading information code printing medium |
JP2010284902A (en) * | 2009-06-12 | 2010-12-24 | Seiko Epson Corp | Method for controlling printing processor, printing processor, print material, and program |
-
2012
- 2012-03-29 WO PCT/JP2012/058425 patent/WO2013145224A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002326443A (en) * | 2001-04-27 | 2002-11-12 | Seiko Epson Corp | Ink jet printing method and printed matter |
JP2005338669A (en) * | 2004-05-31 | 2005-12-08 | Dainippon Printing Co Ltd | Body and article for genuineness decision making, and genuineness deciding method thereof |
JP2006244097A (en) * | 2005-03-03 | 2006-09-14 | National Printing Bureau | Manufacturing method of and authentication method for authentication medium |
JP2007293836A (en) * | 2007-03-30 | 2007-11-08 | Denso Wave Inc | Method for reading information code printing medium and system for reading information code printing medium |
JP2010284902A (en) * | 2009-06-12 | 2010-12-24 | Seiko Epson Corp | Method for controlling printing processor, printing processor, print material, and program |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015106847A (en) * | 2013-11-29 | 2015-06-08 | 共同印刷株式会社 | Decoding method, program, and system |
JP2016004533A (en) * | 2014-06-19 | 2016-01-12 | 株式会社デンソーウェーブ | Method of creating voucher, voucher, voucher reading system, and voucher utilization system |
CN104408499A (en) * | 2014-12-11 | 2015-03-11 | 中搜电子商务(北京)有限公司 | Product anti-counterfeiting system |
US20160191376A1 (en) * | 2014-12-26 | 2016-06-30 | Fujitsu Limited | Information processing apparatus, information processing system, and communication device |
JP2016148932A (en) * | 2015-02-10 | 2016-08-18 | 株式会社東芝 | Ticket authenticity determination system, ticket issuing device, ticket examination device, ticket authenticity determination method and ticket |
JP2021167964A (en) * | 2016-10-07 | 2021-10-21 | 株式会社アーティエンス・ラボ | Information recognition method |
JP7191345B2 (en) | 2016-10-07 | 2022-12-19 | 株式会社アーティエンス・ラボ | Information recognition method |
US10979580B2 (en) * | 2019-02-27 | 2021-04-13 | Kyocera Document Solutions Inc. | Image processing apparatus capable of extending function, and image forming apparatus provided with the same |
CN112418881A (en) * | 2020-11-07 | 2021-02-26 | 许尧龙 | Two-dimensional code authentication coding method and traceability system |
WO2023061374A1 (en) * | 2021-10-11 | 2023-04-20 | 宝洁公司 | Personal consumer product having secured content object |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013145224A1 (en) | 2d code reading device, 2d code reading method, and program | |
US11755867B2 (en) | Composite code pattern, generating device, reading device, method, and program | |
JP6845571B2 (en) | Optical code, optical code creation method, optical code reading method, and barcode reader | |
CN105706107B (en) | The method of the certification of two-dimensional bar and this bar code | |
JP6299916B2 (en) | Information code reading system, information code reading device, and information code forming medium | |
US9483677B2 (en) | Machine-readable symbols | |
JP6288325B2 (en) | Information code and information code reader | |
JP2019192186A (en) | Complex code pattern, generating device, reading device, method, and program | |
KR20140079555A (en) | Check system of authenticity product | |
US20100110196A1 (en) | System and Method for Encoding Authentication | |
KR20140040231A (en) | Method and device for authenticating a tag | |
KR102242678B1 (en) | RFID Tag Preventing Forgery and Falsification Comprising Photonic Crystal Materials and Method Using there of | |
US11361177B2 (en) | Composite information bearing devices | |
JP5724774B2 (en) | Information code reading system and information code reading device | |
KR20200097586A (en) | Apparatus for judging a counterfeit product using QR code authentication of package box | |
CN105452007A (en) | Method for checkingauthenticity of document | |
JP4491285B2 (en) | Information verification system and information verification method using two-dimensional code | |
JP5636523B1 (en) | Image processing apparatus, image processing method, and program | |
KR20130056386A (en) | The code based lotto or sports lotto or printed lotto and service which can automatically recognize by camera sensor or direct input by user's hand in mobile phone | |
JP7083055B1 (en) | Issuing device, authentication device, authentication system, issuing method, and information code | |
JP7407445B2 (en) | Optical reading form and information management method for optical reading form | |
US20210012685A1 (en) | Security label with variable information, upper layer with visual blocking, and tamper evidence and method of use | |
WO2005074391A2 (en) | Two-dimensional code, two-dimensional code forming device and method, two-dimensional code reading device and method, information verification system, and information verifying method | |
JP6575213B2 (en) | Information printed matter, reading method and authentication method | |
WO2017025734A1 (en) | Identification device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12872810 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12872810 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |