WO2013145224A1 - Dispositif de lecture de code 2d, procédé de lecture de code 2d et programme - Google Patents

Dispositif de lecture de code 2d, procédé de lecture de code 2d et programme Download PDF

Info

Publication number
WO2013145224A1
WO2013145224A1 PCT/JP2012/058425 JP2012058425W WO2013145224A1 WO 2013145224 A1 WO2013145224 A1 WO 2013145224A1 JP 2012058425 W JP2012058425 W JP 2012058425W WO 2013145224 A1 WO2013145224 A1 WO 2013145224A1
Authority
WO
WIPO (PCT)
Prior art keywords
dimensional code
authentication
code
reading
information
Prior art date
Application number
PCT/JP2012/058425
Other languages
English (en)
Japanese (ja)
Inventor
東 陽一
博 豊泉
Original Assignee
A・Tコミュニケーションズ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by A・Tコミュニケーションズ株式会社 filed Critical A・Tコミュニケーションズ株式会社
Priority to PCT/JP2012/058425 priority Critical patent/WO2013145224A1/fr
Publication of WO2013145224A1 publication Critical patent/WO2013145224A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/12Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using a selected wavelength, e.g. to sense red marks and ignore blue marks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/14Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/1434Barcodes with supplemental or add-on codes

Definitions

  • the present invention relates to a two-dimensional code reading device, a two-dimensional code reading method, and a program.
  • the two-dimensional code has three positioning symbols obtained by combining squares with a specific ratio, and a plurality of cells arranged between the positioning symbols. By dividing the cells into white and black, a predetermined code is obtained. It expresses the information.
  • Patent Document 1 discloses a two-dimensional code.
  • Such a two-dimensional code is often used because it can express more information than a barcode.
  • the two-dimensional code represents information of a specific URL (Uniform Resource Locator) such as a company or an organization.
  • the two-dimensional code is read by a reading device provided in a mobile phone or the like, so that the URL can be easily accessed from the mobile phone or the like.
  • 2D code is basically a combination of white and black, so it can be copied using a copier.
  • some two-dimensional codes have a monetary value as information, such as a cash voucher or a coupon. For this reason, it is necessary to prevent unauthorized use of a two-dimensional code having a value equivalent to money.
  • the present invention has been made to solve the above-described problems, and an object of the present invention is to provide a two-dimensional code reading device, a two-dimensional code reading method, and a program suitable for preventing two-dimensional code duplication.
  • a two-dimensional code reader provides: Detection means for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code; A reading means for reading information indicated by the two-dimensional code when the authentication code is detected by the detection means; Is provided.
  • the reading means includes A comparison means for comparing the authentication information indicated by the detected authentication code with the information indicated by the two-dimensional code when the authentication code is detected by the detection means; As a result of comparison by the comparison means, when the authentication information and all or part of the information indicated by the two-dimensional code match, the information indicated by the two-dimensional code is acquired as a reading result; You may do it.
  • the information indicated by the two-dimensional code is encrypted,
  • the reading unit decrypts the encrypted information indicated by the two-dimensional code using a decryption key indicated by the detected authentication code, thereby Read encrypted information, You may do it.
  • the information indicated by the two-dimensional code is encrypted
  • Storage means for storing each decryption key of the two-dimensional code readable by the reading means in association with authentication information indicated by the authentication code written in the two-dimensional code
  • the reading means includes An acquisition means for acquiring a decryption key stored in the storage means in association with authentication information indicated by the detected authentication code when the detection means is detected by the detection means; Decrypting means for reading the encrypted information by decrypting the encrypted information indicated by the two-dimensional code using the acquired decryption key; May be included.
  • the reading unit reads the information indicated by the two-dimensional code when the detection unit detects a predetermined number or more of the authentication codes; You may do it.
  • the reading means acquires the information indicated by the two-dimensional code as a reading result when authentication information indicated by a plurality of authentication codes detected by the detection means satisfies a predetermined condition. You may do it.
  • the authentication code is written in a quiet zone of the two-dimensional code. You may do it.
  • the invisible ink is an infrared ink; You may do it.
  • a two-dimensional code reading method includes: A detection step of detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code; A reading step of reading information indicated by the two-dimensional code when the authentication code is detected by the detection step; Is provided.
  • a program provides: On the computer, A detection procedure for detecting an authentication code written with invisible ink within a predetermined range from the position of the two-dimensional code; When the authentication code is detected by the detection procedure, a reading procedure for reading information indicated by the two-dimensional code; Is executed.
  • the present invention it is possible to provide a two-dimensional code reading device, a two-dimensional code reading method, and a program suitable for preventing duplication of a two-dimensional code.
  • the two-dimensional code is a code in a display format that can hold information in two directions, such as a QR (Quick Response) code (registered trademark).
  • Information included in the two-dimensional code includes product and product management information, a URL for accessing with a mobile phone, and information used as a voucher or coupon.
  • the two-dimensional code 1 is used as a point issuing ticket that can be exchanged for a product at a predetermined URL.
  • the two-dimensional code 1 read by the reading device 10 according to the present invention is as follows. Not limited to this, it may be used for other purposes.
  • FIG. 1 is a plan view showing an example of a two-dimensional code according to the present embodiment.
  • 2D code 1 is composed of a plurality of square cells arranged in a matrix. Among the plurality of cells, various types of information are expressed by a distribution pattern of cells having a predetermined lightness (black in this example) and cells having a predetermined lightness or higher (white in this example).
  • information on the URL and information on the number of points such as “3 points” and “5 points”, for example. are expressed by a distribution pattern of a plurality of cells.
  • Three positioning symbols 2a, 2b, and 2c are arranged at three different corners in the two-dimensional code 1.
  • the three positioning symbols 2a, 2b, and 2c are for enabling the reader to detect the position and orientation of the two-dimensional code 1.
  • Such three positioning symbols 2a, 2b, and 2c are distinguished from other cells by arranging a plurality of cells so as to form a distribution pattern in which squares of a specific ratio are combined.
  • a quiet zone 3 is arranged around the two-dimensional code 1.
  • the quiet zone 3 is also called a clear area, a margin, and the like, and is a blank area for distinguishing from other information on the medium to which the two-dimensional code 1 is added.
  • the quiet zone 3 has a predetermined number of cell sizes (for example, four cells), and forms a margin so as to surround the two-dimensional code 1.
  • a dotted line is drawn on the edge to show the area of the quiet zone 3, but this dotted line is not actually drawn.
  • an authentication code 4 is arranged in the upper left corner of the quiet zone 3. This authentication code 4 is for preventing duplication of the two-dimensional code 1 and expresses authentication information required when the reading device reads the two-dimensional code 1. More specifically, the authentication code 4 is configured as shown in FIG.
  • FIG. 2 is a plan view showing an example of the authentication code 4.
  • the authentication code 4 is a code having a smaller vertical and horizontal size than the two-dimensional code 1, and is composed of a plurality of square cells arranged in a matrix.
  • the authentication code 4 has one positioning symbol 5 for position detection at its corner.
  • a quiet zone 6 having a predetermined number of cell sizes (for example, two cells) is disposed around the authentication code 4.
  • the plurality of cells constituting the authentication code 4 are marked with invisible ink so as not to be duplicated by the copying machine. That is, for the sake of easy understanding, a plurality of cells of the actual authentication code 4 are shown by black diagonal lines in FIG. 2, but the quiet zone 3 of the two-dimensional code 1 is made of transparent ink that is not visible with visible light. It is written in.
  • the invisible ink is a transparent ink that allows visible light to pass therethrough, and is an ink such that an illumination lamp used in a scanner of a general copier has no sensitivity for the purpose of preventing duplication.
  • Examples of the invisible ink include ink that is difficult to detect with an ordinary camera having sensitivity to visible light, such as infrared ink, and that can be detected with an infrared camera.
  • the authentication code 4 is described as being written in infrared ink. That is, the authentication code 4 includes a cell having a predetermined wavelength in the infrared region that is less than a predetermined brightness (black in the example of FIG. 2) and a cell having a predetermined wavelength in the infrared region that has a predetermined brightness or more (white in the example of FIG. 2).
  • the authentication information of the two-dimensional code 1 is expressed by the distribution pattern of
  • the authentication code 4 Since it is written in such invisible ink, the authentication code 4 is difficult to be duplicated and does not affect the function of the quiet zone 3 for detecting the two-dimensional code 1.
  • the authentication code of the present invention is not limited to a plurality of cells arranged in a matrix, and may be composed of characters, symbols, figures, patterns, appropriate images, and the like. That is, characters, symbols, figures, patterns, appropriate images, etc. may be written in the quiet zone 3 of the two-dimensional code 1 with invisible ink that is not duplicated by a copying machine.
  • the invisible ink on which the authentication code of the present invention is written is not limited to infrared ink.
  • an illumination lamp used in a scanner of a general copying machine may be an ultraviolet ink that can be detected by an ultraviolet camera.
  • FIG. 3 is a block diagram showing a configuration example of the reading device for the two-dimensional code 1 as described above.
  • the reading device 10 includes a two-dimensional code reading unit 11, an authentication code reading unit 12, a display unit 13, a storage unit 14, an operation unit 15, a communication unit 16, and a control unit 17. These units are connected to each other via a bus.
  • the two-dimensional code reading unit 11 is composed of, for example, a general-purpose two-dimensional code reader.
  • the two-dimensional code reading unit 11 images the two-dimensional code 1 using a camera including an image sensor such as a CCD (Charge-Coupled Device).
  • the two-dimensional code reading unit 11 detects the two-dimensional code 1 from the image obtained by imaging, reads various information indicated by the two-dimensional code 1, and supplies the information to the control unit 17.
  • the two-dimensional code reading unit 11 recognizes a cell having a predetermined brightness as “0” while recognizing a cell having a predetermined brightness or higher as “1”. To do. Then, the two-dimensional code reading unit 11 reads various information from the binary data distribution pattern composed of “0” and “1” recognized in this way.
  • the authentication code reading unit 12 includes a two-dimensional code reader that can detect infrared rays, and reads the authentication code 4 written in infrared ink.
  • the authentication code reading unit 12 uses an infrared camera provided with an image sensor suitable for the spectrum specific to the infrared ink used for the authentication code 4, such as an image sensor such as a CCD having sensitivity to infrared light. Take an image. Then, the authentication code reading unit 12 detects the authentication code 4 from the infrared image obtained by imaging, reads various information indicated by the authentication code 4, and supplies the information to the control unit 17.
  • the authentication code reading unit 12 recognizes a cell having a predetermined wavelength in the infrared region less than a predetermined brightness as “0” in the authentication code 4 shown in FIG. A cell having a predetermined brightness or higher at a wavelength of is recognized as “1”. Then, the authentication code reading unit 12 reads various information from the binary data distribution pattern composed of “0” and “1” recognized in this way.
  • the two-dimensional code reading unit 11 and the authentication code reading unit 12 do not have to be configured by separate cameras.
  • a camera including a single image sensor having sensitivity from visible light to infrared wavelength region may simultaneously image the two-dimensional code 1 and the authentication code 4, or separate visible light and infrared light through a filter. Therefore, the image may be captured.
  • the display unit 13 includes, for example, an LCD (Liquid Crystal Display). Under the control of the control unit 17, the display unit 13 displays an image captured by the two-dimensional code reading unit 11 as a through image or displays information read from the two-dimensional code 1.
  • LCD Liquid Crystal Display
  • the storage unit 14 is composed of, for example, a nonvolatile memory.
  • the storage unit 14 stores various information necessary for reading the two-dimensional code 1 and information for performing authentication by reading the authentication code 4.
  • the operation unit 15 is operated by the user, and includes, for example, a cross cursor key, an alphanumeric button for inputting numbers and characters, and the like.
  • the user operates the operation unit 15 to instruct to read the two-dimensional code 1 and to instruct to access the URL read from the two-dimensional code 1.
  • the communication unit 16 includes, for example, a wireless communication device and is connected to a network. Under the control of the control unit 17, the communication unit 16 accesses, for example, a URL server read from the two-dimensional code 1, and transmits and receives various types of information.
  • a URL server read from the two-dimensional code 1
  • the control unit 17 includes, for example, a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like.
  • the CPU controls the operation of each unit of the reading apparatus 10 by appropriately executing various programs stored in the ROM, the storage unit 14, and the like using the RAM as a work memory.
  • FIG. 4 is a flowchart showing an example of the reading process of the two-dimensional code 1 according to the present embodiment.
  • the control unit 17 determines whether or not the two-dimensional code 1 reading switch has been pressed (step S1). That is, the control unit 17 determines whether or not the operation unit 15 is operated by the user and an instruction to read the two-dimensional code 1 is input.
  • step S1 If it is determined that the reading switch is not pressed (step S1; No), the process remains at step S1. That is, the control unit 17 determines whether or not the reading switch is continuously pressed, and waits until the reading switch is pressed.
  • the control unit 17 uses the authentication code reading unit 12 to acquire a photographed image using infrared rays (step S2). That is, when the reading switch is pressed by the user, the control unit 17 first acquires a photographed image by infrared rays in order to read the authentication code 4. Specifically, the control unit 17 generates an infrared image representing the state of the real world within the field of view of the infrared camera of the authentication code reading unit 12, and stores the generated image data in, for example, a RAM.
  • the control unit 17 determines whether or not the authentication code 4 is present in the acquired captured image (step S3). Specifically, the control unit 17 searches the captured image data and determines whether there is an image corresponding to the quiet zone 6 or the positioning symbol 5 included in the authentication code 4. Thereby, the control part 17 discriminate
  • step S3 If it is determined that there is no authentication code 4 (step S3; No), that is, if the authentication code 4 is not detected, the control unit 17 uses the display unit 13 to display that the two-dimensional code 1 cannot be read. (Step S4). And the reading process of the two-dimensional code 1 in this flowchart is complete
  • step S3 when it is determined that the authentication code 4 is present (step S3; Yes), that is, when the authentication code 4 is detected, the control unit 17 reads the authentication code 4 in the image data (step S5). That is, the control unit 17 obtains the direction and size of the authentication code 4 from the data of the quiet zone 6 and the positioning symbol 5 in the image data, and reads information expressed by a distribution pattern of a plurality of cells constituting the authentication code 4. .
  • the control unit 17 uses the two-dimensional code reading unit 11 to acquire a photographed image by a normal camera (step S6). That is, the control unit 17 detects the two-dimensional code 1 and reads the information indicated by the two-dimensional code 1, and thus acquires a captured image using visible light. Specifically, the control unit 17 generates an image representing the state of the real world within the field of view of the camera of the two-dimensional code reading unit 11, and holds the generated image data in, for example, a RAM.
  • the control unit 17 reads the two-dimensional code 1 in the captured image (step S7). Specifically, the control unit 17 detects the quiet zone 3 and the positioning symbols 2a, 2b, and 2c in the image data, and the two-dimensional code 1 is detected from the data of the detected quiet zone 3 and the positioning symbols 2a, 2b, and 2c. Find the direction and size. Then, the control unit 17 reads information expressed by a distribution pattern of a plurality of cells constituting the two-dimensional code 1.
  • the control unit 17 compares the information read from the two-dimensional code 1 with the authentication information (step S8), and all or a part of the information of the two-dimensional code 1 matches the authentication information. It is determined whether or not to perform (step S9). That is, in this embodiment, the authentication code 4 has authentication information that matches information included in the two-dimensional code 1 to which the authentication code 4 is attached in advance. Then, the control unit 17 authenticates the two-dimensional code 1 by comparing the authentication information read from the authentication code 4 with the information indicated by the two-dimensional code 1.
  • the fact that all or a part of the information of the two-dimensional code 1 matches the authentication information means that the information indicated by the two-dimensional code 1 includes the same or corresponding information as the authentication information. For example, when the authentication information is information “A” and the same information “A” is included in the two-dimensional code 1, the two match. Alternatively, when the authentication information is information “A” and the information “A ′” corresponding to the two-dimensional code 1 is included, the two match.
  • step S9 If it is determined in step S9 that they do not match (step S9; No), the control unit 17 displays that the two-dimensional code 1 cannot be read using the display unit 13 (step S4). And the reading process of the two-dimensional code 1 in this flowchart is complete
  • step S9 if it is determined that they match (step S9; Yes), the control unit 17 acquires information read from the two-dimensional code 1 as a reading result (step S10), and based on the acquired information of the two-dimensional code 1. The process is executed (step S11).
  • the control unit 17 accesses the URL read from the two-dimensional code 1 using the communication unit 16. To do. And the control part 17 transmits the instruction
  • the control unit 17 uses the communication unit 16 to access the URL read from the two-dimensional code 1, and from the URL server to the coupon Get display data.
  • the user can use the two-dimensional code 1 as a coupon by displaying an image based on the coupon display data on the display unit 13 and presenting the image to the service provider.
  • the URL server read from the two-dimensional code 1 stores, for example, the ID (Identification) Data) of the two-dimensional code 1 once added with the points, and the points are added a plurality of times from the same two-dimensional code 1. Management may be performed to prevent this from happening.
  • the two-dimensional code 1 reading device 10 can read the two-dimensional code 1 with the authentication code 4 written in invisible ink in the quiet zone 3. At this time, if the authentication information read from the authentication code 4 does not match all or part of the information read from the two-dimensional code 1, the reading device 10 is based on the information read from the two-dimensional code 1. Do not execute processing. Therefore, the process is not executed from the two-dimensional code 1 that is duplicated and does not have the correct authentication code 4. As a result, it is possible to prevent the two-dimensional code 1 used for a gold ticket or a point ticket from being illegally used by duplication.
  • the authentication code 4 has authentication information that matches the information included in the two-dimensional code 1 to which the authentication code 4 is attached.
  • the correspondence relationship between the authentication information that is the matching condition and the information of the two-dimensional code 1 may be stored in advance in the storage unit 14 of the reading device 10 as illustrated in FIG. 5, for example.
  • authentication information A, authentication information B, authentication information C,... are information A ′ included in the two-dimensional code, information B ′ included in the two-dimensional code, and information included in the two-dimensional code, respectively.
  • the storage unit 14 includes, for each of the two-dimensional codes 1 that can be read by the two-dimensional code reading unit 11, information to be compared included in the two-dimensional code 1 and authentication attached to the two-dimensional code 1.
  • the authentication information indicated by the code 4 is stored in association with each other.
  • the two-dimensional code 1 and the authentication code 4 each have numeric data for authentication, and the sum or product of the number read from the two-dimensional code 1 and the number read from the authentication code 4
  • the above-mentioned matching condition may be satisfied when the result of the calculation matches a predetermined number.
  • the reading device 10 of the present embodiment includes a two-dimensional code reading unit 11, an authentication code reading unit 12, a display unit 13, a storage unit 14, an operation unit 15, and communication.
  • the two-dimensional code 1 read by the reading device 10 according to the present embodiment expresses various types of information by a plurality of cells arranged in a matrix like the two-dimensional code 1 according to the first embodiment.
  • an authentication code 4 for preventing duplication is written in invisible ink.
  • the two-dimensional code 1 of the present embodiment is encrypted so as not to be read by a general-purpose two-dimensional code reader.
  • the information included in the two-dimensional code 1 is converted by a conversion algorithm that can be decrypted only with a predetermined decryption key, and a protection process is performed such that the information cannot be read by devices other than the reader 10.
  • the authentication code 4 has information for decrypting the encrypted two-dimensional code 1.
  • FIG. 6 is a flowchart showing an example of the reading process of the two-dimensional code 1 according to the present embodiment.
  • the control unit 17 determines whether or not the reading switch of the two-dimensional code 1 is pressed (step S21). That is, the control unit 17 determines whether or not the operation unit 15 is operated by the user and an instruction to read the two-dimensional code 1 is input.
  • step S21 If it is determined that the reading switch has not been pressed (step S21; No), the process remains at step S1. That is, the control unit 17 determines whether or not the reading switch is continuously pressed, and waits until the reading switch is pressed.
  • the control unit 17 uses the authentication code reading unit 12 to acquire a photographed image using infrared rays (step S22). That is, when the reading switch is pressed by the user, the control unit 17 first acquires a photographed image by infrared rays in order to read the authentication code 4. Specifically, the control unit 17 generates an infrared image representing the state of the real world within the field of view of the infrared camera of the authentication code reading unit 12, and stores the generated image data in, for example, a RAM.
  • the control unit 17 determines whether or not the authentication code 4 is present in the acquired captured image (step S23). Specifically, the control unit 17 searches the captured image data and determines whether there is an image corresponding to the quiet zone 6 or the positioning symbol 5 included in the authentication code 4. Thereby, the control part 17 discriminate
  • step S23 If it is determined that there is no authentication code 4 (step S23; No), that is, if the authentication code 4 is not detected, the control unit 17 uses the display unit 13 to display that the two-dimensional code 1 cannot be read. (Step S24). And the reading process of the two-dimensional code 1 in this flowchart is complete
  • step S23 if it is determined that the authentication code 4 is present (step S23; Yes), that is, if the authentication code 4 is detected, the control unit 17 reads the authentication code 4 in the image data (step S25).
  • a decryption key of dimension code 1 is acquired (step S26). That is, the authentication code 4 indicates the information of the decryption key of the two-dimensional code 1 to which the authentication code 4 is attached by the cell distribution pattern.
  • the control unit 17 obtains the direction and size of the authentication code 4 from the data of the quiet zone 6 and the positioning symbol 5 in the image data, and reads information expressed by a distribution pattern of a plurality of cells constituting the authentication code 4.
  • the decryption key of the two-dimensional code 1 is acquired.
  • the control unit 17 uses the two-dimensional code reading unit 11 to acquire a photographed image by a normal camera (step S27). That is, the control unit 17 detects the two-dimensional code 1 and reads the information indicated by the two-dimensional code 1, and thus acquires a captured image using visible light. Specifically, the control unit 17 generates an image representing the state of the real world within the field of view of the camera of the two-dimensional code reading unit 11, and holds the generated image data in, for example, a RAM.
  • the control unit 17 reads the two-dimensional code 1 in the captured image (step S28). Specifically, the control unit 17 detects the quiet zone 3 and the positioning symbols 2a, 2b, and 2c in the image data, and the two-dimensional code 1 is detected from the data of the detected quiet zone 3 and the positioning symbols 2a, 2b, and 2c. Find the direction and size. Then, the control unit 17 reads information expressed by a distribution pattern of a plurality of cells constituting the two-dimensional code 1.
  • the control unit 17 decodes the read information of the two-dimensional code 1 (step S29). That is, the two-dimensional code 1 is encrypted so as not to be read by a general-purpose two-dimensional code reader. The control unit 17 decrypts the encrypted information read from the two-dimensional code 1 using the decryption key acquired in step S26.
  • control unit 17 executes a process based on the decoded information of the two-dimensional code 1 (step S30). Then, the reading process of the two-dimensional code 1 in this flowchart is complete
  • the two-dimensional code 1 reading device 10 acquires the decryption key of the two-dimensional code 1 from the authentication code 4 written with invisible ink in the quiet zone 3, and uses this decryption key. By using it, information is read from the two-dimensional code 1. Therefore, since the decryption key is not acquired from the two-dimensional code 1 that is duplicated and does not have the correct authentication code 4, information is not read. As a result, it is possible to prevent the two-dimensional code 1 used for a gold ticket or a point ticket from being illegally used by duplication.
  • the decryption key information of the two-dimensional code 1 is included in the authentication code 4 attached to the two-dimensional code 1.
  • the decryption key in the present invention may be stored in the storage unit 14 of the reading device 10. In this case, for example, as illustrated in FIG. 7, the storage unit 14 stores the authentication information and the decryption key of the two-dimensional code 1 in association with each other.
  • authentication information X, authentication information Y, authentication information Z,... are indicated by authentication code 4 attached to two-dimensional code X, two-dimensional code Y, two-dimensional code Z,.
  • Authentication information That is, the decryption key for reading the two-dimensional code X is associated with the authentication information X indicated by the authentication code 4 attached to the two-dimensional code X, and the decryption key for reading the two-dimensional code Y is The decryption key for reading the two-dimensional code Z, which is associated with the authentication information Y indicated by the authentication code 4 attached to the dimension code Y, is stored in the authentication information Z indicated by the authentication code 4 attached to the two-dimensional code Z. It is associated.
  • the storage unit 14 attaches the decryption key data of the two-dimensional code 1 to the two-dimensional code 1 for each of the two-dimensional codes 1 that can be read by the two-dimensional code reading unit 11. Stored in association with the authentication information read from the authentication code 4 that has been read. Then, when the authentication code reading unit 12 reads the authentication code 4, the control unit 17 obtains a decryption key stored in association with the read authentication information in advance.
  • this invention is not limited to the said embodiment, A various deformation
  • the processing of the information read from the two-dimensional code 1 is appropriately authenticated by the authentication code 4 detected by the authentication code reading unit 12 and further by the authentication information read from the authentication code 4. If executed.
  • the authentication processing using the authentication information read from the authentication code 4 may be omitted.
  • the two-dimensional code reading unit 11 reads the two-dimensional code 1, and the process is performed regardless of the authentication information included in the authentication code 4. It may be executed. With such a configuration, duplication of the two-dimensional code 1 can be prevented by simpler means.
  • the information indicated by the two-dimensional code 1 is not processed unless it is properly authenticated by the authentication information read from the authentication code 4.
  • the authentication information read from the authentication code 4 may be transmitted to the URL server, and the authentication process may be performed in the server.
  • the authentication information read from the authentication code 4 is compared with the information of the two-dimensional code 1, and if both match, for example, a predetermined point is added such that points are added. These processes may be executed.
  • a decryption key associated with the authentication information read from the authentication code 4 is acquired, and processing such as point addition is not performed without this decryption key May be applied.
  • the reading process of the two-dimensional code 1 may be executed.
  • FIG. 8 is a diagram showing an example of the two-dimensional code 1 in which four authentication codes 4 are written at the four corners of the quiet zone 3.
  • the control unit 17 detects each of the four authentication codes 4 by the authentication code reading unit 12. More specifically, the control unit 17 detects the authentication codes 4 one by one using the authentication code reading unit 12 for each of the four authentication codes 4 marked at the four corners. Alternatively, the control unit 17 acquires one infrared image by the authentication code reading unit 12 having a field of view in which all four authentication codes 4 written at the four corners are included, and four authentication codes are extracted from the infrared images. 4 may be detected.
  • control part 17 performs the reading process of the two-dimensional code 1 when the authentication code 4 more than a predetermined number is detected.
  • the reading process of the two-dimensional code 1 may not be performed unless all four authentication codes 4 are detected, or more than a predetermined number such as one, two, three, etc.
  • the reading process of the two-dimensional code 1 may be executed.
  • control unit 17 reads the authentication information from the plurality of detected authentication codes 4, and the read authentication information satisfies predetermined conditions as described below. If it is satisfied, the two-dimensional code 1 may be read.
  • the four authentication codes 4 may include mutually matching authentication information, and the control unit 17 may compare the authentication information included in the detected four authentication codes 4 with each other. And it may be set as a condition for reading the information of the two-dimensional code 1 that the four pieces of authentication information match.
  • the control unit 17 compares the detected authentication information of the authentication code 4 with the information of the two-dimensional code 1, and if the authentication information matches all or part of the information of the two-dimensional code 1, the control unit 17 You may make it acquire the information of code
  • the matching condition at this time can be satisfied when the four pieces of authentication information are the same or correspond to each other, as in the first embodiment.
  • Each of the authentication information included in the four authentication codes 4 partially includes the decryption key data of the two-dimensional code 1, and the control unit 17 combines the four authentication information read by the authentication code reading unit 12. Thus, one decryption key may be acquired.
  • the fact that the decryption key can be acquired from the four authentication codes 4 may be a condition for reading the information of the two-dimensional code 1.
  • the combination of the four authentication information and the decryption key of the two-dimensional code 1 are associated with each other and stored in advance in the storage unit 14 or the like, and the control unit 17 reads the four authentication information read by the authentication code reading unit 12.
  • a combination and a decryption key stored in association with the combination may be acquired.
  • a condition for reading the information of the two-dimensional code 1 may be that the decryption key associated with the combination of the four pieces of authentication information can be acquired.
  • the authentication code 4 is arranged so as to be within the quiet zone 3 of the two-dimensional code 1.
  • the authentication code 4 in the present invention may be arranged at any position, for example, outside the quiet zone 3 as long as it can be read appropriately.
  • the authentication code 4 is preferably arranged as close to the two-dimensional code 1 as possible.
  • the authentication code 4 may be arranged so as to extend over both the area where the two-dimensional code 1 is written and the quiet zone 3.
  • the authentication code 4 since the authentication code 4 is written in ink that transmits visible light, even if the authentication code 4 is written over the two-dimensional code 1, it does not prevent the two-dimensional code reading unit 11 from reading the two-dimensional code 1. .
  • the authentication code reading unit 12 can appropriately read the infrared rays from the authentication code 4 without being obstructed by the visible light from the two-dimensional code 1, the authentication code 4 is written at a position overlapping the two-dimensional code 1. Even if it is, the authentication code 4 can be read appropriately.
  • the authentication code of the present invention may be a one-dimensional code.
  • the authentication code may be an authentication code 7 written in invisible ink over one side of the quiet zone 3 of the two-dimensional code 1.
  • the authentication code of the present invention includes characters, symbols, figures, patterns, appropriate images, etc., as long as the predetermined authentication information can be expressed by the authentication code reader 12. It may be.
  • the two-dimensional code 1 may be displayed with a logo superimposed thereon. That is, a logo such as a figure, a character, a symbol, or a picture may be designed on a plurality of cells having a lightness distribution pattern as shown in FIG.
  • a logo expressing the characters “3 points” so as to be visible is superimposed on the two-dimensional code 1 and displayed.
  • Such logos overlap circular cells with less than a predetermined brightness (black cells in this example) on areas of the logo that have a predetermined brightness or higher, while circles with a predetermined brightness or higher in the logo with a predetermined brightness. Are formed by overlapping the cells (in this example, white cells).
  • the two-dimensional code 1 on which the logo is superimposed various types of information can be obtained depending on the distribution pattern of the area below the predetermined brightness and the cells below the predetermined brightness in the logo, and the area above the predetermined brightness and the cells above the predetermined brightness in the logo. Is expressed.
  • the two-dimensional code 1 on which such a logo is superimposed is preferably full color from the viewpoint of preventing forgery, but may be gray scale.
  • the shape of the cell for representing the logo is arbitrary, and may be a circle, a polygon, a star, or the like.
  • the information content included in the two-dimensional code 1 can be recognized by the user.
  • the logo of the number of points is not limited, and a logo of a company that handles point issuance tickets may be designed to be superimposed on the two-dimensional code 1. Thereby, the visibility and designability of the two-dimensional code 1 can be enhanced.
  • the two-dimensional code 1 on which the logo is superimposed is formed by superimposing a circular cell (in this example, a white cell) with a predetermined brightness or higher on a logo mark with a predetermined brightness or lower.
  • a circular cell in this example, a white cell
  • Various types of information may be expressed by the distribution pattern of the portion where the cells are not overlapped.
  • the two-dimensional code 1 information unique to the two-dimensional code 1, such as information on the date and time of issue and a management number, may be embedded. Thereby, even when there are a plurality of two-dimensional codes 1 expressing the same number of points, each two-dimensional code 1 can be distinguished. Therefore, the degree of prevention of duplication of the two-dimensional code 1 can be further increased.
  • the two-dimensional code 1 is described as a QR code (registered trademark).
  • the present invention is not limited to this, and the two-dimensional code 1 may be a data matrix, an aztec code, or the like.
  • Other matrix type two-dimensional codes such as code one, array tag, box graphic code, maxi code, peri code, soft strip, CP code, carla code, and ultra code may be used.
  • a stack type two-dimensional code in which one-dimensional codes such as PDF417, code 49, code 16k, and coder block are vertically stacked may be used.
  • the program executed by the CPU has been described as being stored in advance in the ROM, the storage unit 14 or the like.
  • the present invention is not limited to this, and is for executing the above-described processing.
  • the above program may be applied to an existing general-purpose computer so as to function as the reading device 10 according to the above-described embodiment.
  • Such a program can be provided by any method, for example, stored in a computer-readable non-transitory recording medium (flexible disk, CD (Compact Disc) -ROM, DVD (Digital Versatile Disc) -ROM, etc.).
  • the program may be distributed, or may be provided by storing the program in a storage on a network such as the Internet and downloading it.
  • the application program when the above processing is executed by sharing between the OS and the application program or by cooperation between the OS and the application program, only the application program may be stored in a recording medium or storage. It is also possible to superimpose a program on a carrier wave and distribute it via a network. For example, the program may be posted on a bulletin board (BBS: Bulletin Board System) on the network, and the program may be distributed via the network. Then, this program may be activated and executed in the same manner as other application programs under the control of the OS, so that the above processing can be executed.
  • BSS Bulletin Board System

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

Un dispositif de lecture (10) de code 2D (1) a un moyen de détection et un moyen de lecture. Le moyen de détection du dispositif de lecture (10) détecte un code d'authentification (4) qui est imprimé avec une encre invisible à l'intérieur d'une distance prescrite à partir de la position du code 2D (1). Si le code d'authentification (4) qui est imprimé avec une encre invisible à l'intérieur d'une distance prescrite à partir de la position du code 2D (1) est détecté, les moyens de lecture du dispositif de lecture (10) lisent les informations indiquées par le code 2D (1).
PCT/JP2012/058425 2012-03-29 2012-03-29 Dispositif de lecture de code 2d, procédé de lecture de code 2d et programme WO2013145224A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2012/058425 WO2013145224A1 (fr) 2012-03-29 2012-03-29 Dispositif de lecture de code 2d, procédé de lecture de code 2d et programme

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2012/058425 WO2013145224A1 (fr) 2012-03-29 2012-03-29 Dispositif de lecture de code 2d, procédé de lecture de code 2d et programme

Publications (1)

Publication Number Publication Date
WO2013145224A1 true WO2013145224A1 (fr) 2013-10-03

Family

ID=49258588

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2012/058425 WO2013145224A1 (fr) 2012-03-29 2012-03-29 Dispositif de lecture de code 2d, procédé de lecture de code 2d et programme

Country Status (1)

Country Link
WO (1) WO2013145224A1 (fr)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408499A (zh) * 2014-12-11 2015-03-11 中搜电子商务(北京)有限公司 产品防伪系统
JP2015106847A (ja) * 2013-11-29 2015-06-08 共同印刷株式会社 復号化方法、プログラム及びシステム
JP2016004533A (ja) * 2014-06-19 2016-01-12 株式会社デンソーウェーブ 証票の生成方法、証票、証票読取システム、及び証票利用システム
US20160191376A1 (en) * 2014-12-26 2016-06-30 Fujitsu Limited Information processing apparatus, information processing system, and communication device
JP2016148932A (ja) * 2015-02-10 2016-08-18 株式会社東芝 チケット真偽判定システム、チケット発券装置、チケット検札装置、チケット真偽判定方法およびチケット
CN112418881A (zh) * 2020-11-07 2021-02-26 许尧龙 一种二维码认证打码方法及溯源系统
US10979580B2 (en) * 2019-02-27 2021-04-13 Kyocera Document Solutions Inc. Image processing apparatus capable of extending function, and image forming apparatus provided with the same
JP2021167964A (ja) * 2016-10-07 2021-10-21 株式会社アーティエンス・ラボ 情報認識方法
WO2023061374A1 (fr) * 2021-10-11 2023-04-20 宝洁公司 Produit de consommation personnel à objet de contenu sécurisé

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002326443A (ja) * 2001-04-27 2002-11-12 Seiko Epson Corp インクジェット印刷方法および印刷物
JP2005338669A (ja) * 2004-05-31 2005-12-08 Dainippon Printing Co Ltd 真贋判定体及び真贋判定物品とその真贋判定方法
JP2006244097A (ja) * 2005-03-03 2006-09-14 National Printing Bureau 認証媒体の作製方法及びその認証方法
JP2007293836A (ja) * 2007-03-30 2007-11-08 Denso Wave Inc 情報コード印刷媒体読取方法及び情報コード印刷媒体読取装置
JP2010284902A (ja) * 2009-06-12 2010-12-24 Seiko Epson Corp 印刷処理装置の制御方法、印刷処理装置、印刷物およびプログラム

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002326443A (ja) * 2001-04-27 2002-11-12 Seiko Epson Corp インクジェット印刷方法および印刷物
JP2005338669A (ja) * 2004-05-31 2005-12-08 Dainippon Printing Co Ltd 真贋判定体及び真贋判定物品とその真贋判定方法
JP2006244097A (ja) * 2005-03-03 2006-09-14 National Printing Bureau 認証媒体の作製方法及びその認証方法
JP2007293836A (ja) * 2007-03-30 2007-11-08 Denso Wave Inc 情報コード印刷媒体読取方法及び情報コード印刷媒体読取装置
JP2010284902A (ja) * 2009-06-12 2010-12-24 Seiko Epson Corp 印刷処理装置の制御方法、印刷処理装置、印刷物およびプログラム

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015106847A (ja) * 2013-11-29 2015-06-08 共同印刷株式会社 復号化方法、プログラム及びシステム
JP2016004533A (ja) * 2014-06-19 2016-01-12 株式会社デンソーウェーブ 証票の生成方法、証票、証票読取システム、及び証票利用システム
CN104408499A (zh) * 2014-12-11 2015-03-11 中搜电子商务(北京)有限公司 产品防伪系统
US20160191376A1 (en) * 2014-12-26 2016-06-30 Fujitsu Limited Information processing apparatus, information processing system, and communication device
JP2016148932A (ja) * 2015-02-10 2016-08-18 株式会社東芝 チケット真偽判定システム、チケット発券装置、チケット検札装置、チケット真偽判定方法およびチケット
JP2021167964A (ja) * 2016-10-07 2021-10-21 株式会社アーティエンス・ラボ 情報認識方法
JP7191345B2 (ja) 2016-10-07 2022-12-19 株式会社アーティエンス・ラボ 情報認識方法
US10979580B2 (en) * 2019-02-27 2021-04-13 Kyocera Document Solutions Inc. Image processing apparatus capable of extending function, and image forming apparatus provided with the same
CN112418881A (zh) * 2020-11-07 2021-02-26 许尧龙 一种二维码认证打码方法及溯源系统
WO2023061374A1 (fr) * 2021-10-11 2023-04-20 宝洁公司 Produit de consommation personnel à objet de contenu sécurisé

Similar Documents

Publication Publication Date Title
WO2013145224A1 (fr) Dispositif de lecture de code 2d, procédé de lecture de code 2d et programme
JP6845571B2 (ja) 光学コード、光学コードの作成方法、光学コードの読取方法、及びバーコードの読取装置
US11755867B2 (en) Composite code pattern, generating device, reading device, method, and program
CN105706107B (zh) 二维条形码以及这种条形码的认证的方法
JP6299916B2 (ja) 情報コード読取システム、情報コード読取装置、及び情報コード形成媒体
US9483677B2 (en) Machine-readable symbols
JP6288325B2 (ja) 情報コードおよび情報コード読取装置
JP2019192186A (ja) 複合コードパターン、生成装置、読み取り装置、方法およびプログラム
KR20140079555A (ko) 위조품 방지를 위한 신제품의 정품확인시스템 및 정품확인방법
KR20140040231A (ko) 태그 인증을 위한 방법 및 장치
US20100110196A1 (en) System and Method for Encoding Authentication
JP2011211666A (ja) 伝票処理システム
US20190163944A1 (en) Composite information bearing devices
JP5724774B2 (ja) 情報コード読取システム及び情報コード読取装置
KR20200097586A (ko) 패키지 박스의 qr 코드 인증을 이용한 위품 판정 장치
CN105452007A (zh) 用于验证文件真实性的方法
JP4491285B2 (ja) 2次元コードによる情報検証システム及び情報検証方法
KR102242678B1 (ko) 광결정 소재를 포함하는 위변조 방지용 전자태그 및 이의 활용방법
JP5636523B1 (ja) 画像処理装置、画像処理方法、及びプログラム
JP7407445B2 (ja) 光学読取帳票および光学読取帳票の情報管理方法
WO2005074391A2 (fr) Code a deux dimensions, dispositif et procede de formation de code a deux dimensions, dispositif et procede de lecture de code a deux dimensions, systeme de verification d'information, et procede de verification d'information
JP6575213B2 (ja) 情報印刷物および読取方法ならびに認証方法
WO2017025734A1 (fr) Dispositif et système d'identification
JP2006011846A (ja) 2次元コード及び該2次元コードによる情報検証システム並びに情報検証方法
KR101599636B1 (ko) 병행수입물품 통관표지 및 병행수입물품 통관표지 관리시스템과 그 시스템의 운영방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12872810

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12872810

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP