WO2014139386A1 - Anti-counterfeiting system and method thereof for tag forming, embedding, interpreting, authenticating and ownership changing - Google Patents

Anti-counterfeiting system and method thereof for tag forming, embedding, interpreting, authenticating and ownership changing Download PDF

Info

Publication number
WO2014139386A1
WO2014139386A1 PCT/CN2014/073140 CN2014073140W WO2014139386A1 WO 2014139386 A1 WO2014139386 A1 WO 2014139386A1 CN 2014073140 W CN2014073140 W CN 2014073140W WO 2014139386 A1 WO2014139386 A1 WO 2014139386A1
Authority
WO
WIPO (PCT)
Prior art keywords
counterfeiting
identifier
counterfeit
identification
ownership
Prior art date
Application number
PCT/CN2014/073140
Other languages
French (fr)
Chinese (zh)
Inventor
张小北
Original Assignee
Chang Kenneth
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chang Kenneth filed Critical Chang Kenneth
Publication of WO2014139386A1 publication Critical patent/WO2014139386A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Definitions

  • the present invention relates to the field of anti-counterfeiting technology, and more particularly to an invisible point code anti-counterfeiting system, embedding invisible point code in a digital file, forming an anti-counterfeit tag, interpreting an anti-counterfeit mark, authenticating the anti-counterfeit mark, and changing the anti-counterfeiting.
  • the method of identifying ownership is a part of the present invention.
  • Case 3 In the Chinese patent application number 201020646885. X (application date December 8, 2010), the title is “an anti-counterfeit mark”, and the anti-counterfeiting mark is printed with the query code and the anti-counterfeiting. An inquiry phone number and a query URL are also available. Users can log in to the website, enter the search code to query, and check the number, color, position and shape of the matching. This technology is characterized by high randomness and low recognizability. The inconvenience of the technology inevitably leads to a low query rate, leaving a loophole for the fraud of one yard and multiple prints.
  • the anti-counterfeiting feature of anti-counterfeiting technology products can be adapted to the requirements of the target or service object.
  • Recognition performance The anti-counterfeiting feature of the anti-counterfeiting technology product can be correctly identified by the sense or machine within the required identification time.
  • Environmental requirements for use The anti-counterfeiting performance of anti-counterfeiting technology products should meet the requirements of the normal use environment of the target materials.
  • Technical security and confidentiality The technology for designing and manufacturing anti-counterfeiting technology products should be secure and confidential.
  • the technical problem to be solved by the present invention is to provide an invisible point code anti-counterfeiting system with high technical threshold, convenient use, and instant identification for the defects of the prior art, such as low threshold, inconvenient use, and instant identification. Embedding invisible point codes, forming anti-counterfeit tags, interpreting anti-counterfeit tags, authenticating anti-counterfeit logos, and changing the ownership of anti-counterfeiting logos in digital files.
  • the technical solution adopted by the present invention to solve the technical problem is: constructing an invisible point code anti-counterfeiting system, comprising an anti-counterfeit identifier for transmitting commodity information, and for identifying the anti-counterfeit identifier by acquiring a digitized image of the anti-counterfeit identifier a pseudo-identifier and a code for storing the issued anti-counterfeit identification and related item identification information, and assisting the identification reader pair
  • the background image is disposed on the carrier, and the invisible dot code is embedded in the background graphic and links the anti-counterfeiting identifier and its information through a network.
  • the identifier reader includes an image capturing unit for acquiring a digitized image of the anti-counterfeiting mark, a main control unit for controlling each unit to perform corresponding operations, and a device for A communication unit that communicates with the background server and a display unit for displaying information.
  • the invisible dot code includes a plurality of color micro-dots arranged in the set encoding mode and arranged in the background image after the arrangement.
  • the invisible point code carries the encoding information of the anti-counterfeiting identifier
  • the background graphic is randomly generated and carries anti-counterfeiting content
  • the carrier comprises a paper medium or a plastic. a medium or metal medium or a computer screen or a mobile phone screen; the encoded information includes one-dimensional encoding or multi-dimensional encoding.
  • the multi-dimensional code includes an encoding of the carrier and an encoding of the location of the anti-counterfeit identifier; the multi-dimensional encoding is represented by a 26-digit decimal number; An area is defined by multidimensional coordinates.
  • the invention also relates to a method for embedding an invisible point code in a digitized file, comprising the steps of:
  • A1 converting a digitized file into a digitized image, using the digitized image as a background image of the anti-counterfeit logo;
  • step E1 determining whether all of the color micro-dots are embedded in the background image, and if so, ending the embedding operation; otherwise, acquiring the next color micro-dot and returning to step Bl).
  • the invention also relates to a method for forming an anti-counterfeit label, comprising the following steps:
  • the feedback information includes relevant authentication results or/and text and/or images or/and web pages or / and short films or / and ads;
  • the invention also relates to a method for interpreting an anti-counterfeiting mark, comprising the following steps:
  • the identifier reader scans the anti-counterfeit logo
  • the parameters obtained by the decoding include scan image, multi-dimensional coordinates, query time, query location, and identifier reader identity information;
  • the background server uniquely identifies the anti-counterfeiting identifier and returns an identification result to the identifier reader;
  • the parameters required for the identification include multi-dimensional coordinates, query time, query location, and identifier reader identity information;
  • the background server compares the scanned image with a previously stored background graphic and returns the comparison result to the identifier reader;
  • G3 querying the background database, extracting first data corresponding to the multidimensional coordinates, and transmitting the first data back to the identifier reader;
  • the H3 displaying the first data on the identification reader; the first data comprising an identification result or/and associated text or/and image or/and webpage or/and a short film.
  • the step C3) further includes:
  • the C31 automatically detecting parameters of various invisible point codes from the digitized image;
  • the detected parameters include a coding type, an encoding dimension, a size, and an orientation;
  • C32) Decoding the invisible point code according to the detected parameter to obtain a multi-dimensional coordinate.
  • the step F3) further includes:
  • F33 determining whether the first value is greater than a set value, and if yes, returning the information of the successful authentication to the identifier reader for display; otherwise, returning the information of the authentication failure to the identifier reader for display.
  • the invention also relates to a method for authenticating the authenticity of an anti-counterfeit mark, comprising the following steps:
  • the query parameter includes the anti-counterfeiting identifier code, the query time, the query location, and the identity of the query identifier reader;
  • the background server collects the query record related to the anti-counterfeit identification code
  • D4 determining whether the probability is greater than a preset threshold, and if so, determining that the anti-counterfeiting flag is true; otherwise, determining that the anti-counterfeiting flag is false.
  • the invention also relates to a method for changing the ownership of an anti-counterfeiting identifier, comprising the steps of:
  • the method for obtaining ownership of the anti-counterfeiting identifier includes the following steps: A6) displaying an anti-counterfeiting identifier ownership form, and prompting the user to input the form content;
  • step C6 The system determines whether the user has the control right of the anti-counterfeit mark according to the scan record; if yes, step C6); otherwise, exits the operation;
  • the method for assigning the ownership of the anti-counterfeiting identifier includes the following steps:
  • A7) generate a background image according to the content of the ownership of the security mark
  • the receiver scans the ownership of the first identifier reader of the transferor with a second identifier reader
  • the system updates the database record, transferring ownership of the anti-counterfeit identification from the transferor to the recipient.
  • the invisible dot code anti-counterfeiting system embodying the present invention the embedded invisible dot code in the digitized file, the formation of the anti-counterfeit tag, the interpretation of the anti-counterfeit tag, the authenticity of the anti-counterfeit mark, and the method of changing the ownership of the anti-counterfeit mark have the following beneficial effects:
  • the invisible point code content of the logo is directly embedded in a digital file.
  • the layout of the file itself does not need to be modified, so its technical threshold is high and easy to use.
  • users only need to use the identifier reader to scan
  • the authenticity of the product can be quickly identified, so it can be instantly identified.
  • 1 is a stealth point code anti-counterfeiting system of the present invention, a method for embedding an invisible point code in a digitized file, a method for forming an anti-counterfeit tag, a method for interpreting an anti-counterfeit tag, a method for authenticating an authenticity of an anti-counterfeit mark, and an embodiment of a method for changing the ownership of an anti-counterfeit mark
  • Schematic diagram of the structure of the invisible point code anti-counterfeiting system 3 is a one-to-one correspondence between the anti-counterfeit mark and the 26-digit decimal number in the embodiment;
  • Figure 4 is a schematic view showing the position of the anti-counterfeit mark in the embodiment
  • Figure 5 is a schematic diagram showing the multi-dimensional coding of the anti-counterfeit identification in the embodiment
  • FIG. 6 is a schematic diagram of high resolution and overlapability of an anti-counterfeit mark in the embodiment
  • Figure 7 is a schematic structural view of the identifier interpreter in the embodiment.
  • FIG. 8 is a schematic diagram showing a specific structure of an invisible point code anti-counterfeiting system when the identifier interpreter is a mobile phone interrogator in the embodiment;
  • FIG. 9 is a flowchart of a method for embedding an invisible point code in a digitized file in the embodiment;
  • Figure 10 is a flow chart showing a method of forming an anti-counterfeit label in the embodiment
  • FIG. 11 is a flowchart of a method for interpreting an anti-counterfeit mark in the embodiment
  • FIG. 13 is a specific flowchart of the background server uniquely identifying the anti-counterfeiting identifier and returning the identification result to the identifier interpreter in the embodiment;
  • FIG. 14 is a specific flowchart of the background server comparing the scanned image with a previously stored background image and returning the comparison result to the identifier reader in the embodiment;
  • 15 is a flowchart of a method for identifying authenticity of an anti-counterfeit mark in the embodiment
  • Figure 16 is a flow chart showing a method of changing the security of the security feature in the embodiment.
  • 17 is a flowchart of a method for acquiring ownership of an anti-counterfeit mark in the embodiment
  • Figure 18 is a flow chart of a method of assigning ownership of an anti-counterfeit mark in the embodiment.
  • the invisible point code anti-counterfeiting system includes an anti-counterfeiting mark 1, an identification interpreter 2, and a background server 3.
  • Anti-counterfeit mark 1 also known as anti-counterfeit mark, or anti-counterfeit mark, is a kind of material that can be pasted, printed, transferred to the surface of the object or on the label of the object or attached to the object (such as commodity listing, business card and security card).
  • the anti-counterfeit mark 1 is used to transmit product information, and the purpose thereof is to convey the title, depiction, composition, effective date, brand information, and the like of the product to the consumer.
  • the identifier reader 2 is configured to obtain the authenticity of the anti-counterfeit identification 1 by acquiring the digitized image of the anti-counterfeit identification 1
  • the background server 3 is configured to store the code of the issued anti-counterfeit identification 1 and related commodity identification information, and assist the identification reader 2 in anti-counterfeiting Mark 1 is authenticated.
  • the anti-counterfeiting mark 1 is evidence of an entity, and its function is to transmit the commodity information and at the same time serve as a basis for authenticating the authenticity of the commodity.
  • One of the characteristics of the anti-counterfeiting mark 1 is its uniqueness.
  • the pattern on each anti-counterfeit mark is unique, like a human fingerprint, and no two anti-counterfeit marks have the same pattern.
  • a common method of counterfeiting is to first spoof a genuine product and then make a large number of copies. In this embodiment, since there is only one anti-counterfeit mark 1 for each genuine product, the counterfeiter cannot be copied in a large amount. If you want to create 100 fake logos, you must spoof 100 different true logos.
  • Another feature of the anti-counterfeiting mark 1 is its convenience. When used, the pre-made anti-counterfeit mark 1 can be attached to the product for consumer identification, and the anti-counterfeit mark 1 can be directly printed on the product, which is advantageous for a large quantity, low unit price and high-speed production line.
  • the identifier reader 2 is a mobile phone application. Specifically, the identifier reader 2 is a mobile phone reader (specifically, a mobile phone), and its function is to identify the authenticity of the security identifier 1. In this embodiment, one of the features of the identifier reader 2 is to obtain a digitized image of the anti-counterfeit identifier 1 by using the camera function of the mobile phone, and use the communication function of the mobile phone and the background server 3 to perform online operations to identify the authenticity of the anti-counterfeit identifier 1. A further feature of the identification reader 2 is its generalization and ease of use. Modern people are almost a human hand. The identification of anti-counterfeiting mark 1 does not require professional training and does not require complicated and expensive instruments.
  • the user When purchasing a product, the user simply scans the anti-counterfeiting mark 1 on the product with a mobile phone, and can immediately identify the authenticity of the product.
  • Another feature of the identifier reader 2 is the ability to identify false identifiers. Even if the fake security identifier is 100% identical to the authentic security identifier, it will be authenticated immediately after the identifier reader 2 is compared with the background server 3. come out. The code of the anti-counterfeit mark 1 of the line and the related product identification information.
  • the current anti-counterfeiting mark 1 has a coded capacity of 26 digits in decimal numbers, so that the large capacity is sufficient to include the coding requirements of each item produced in the present and future years.
  • Another function of the background server 3 is to assist the identification reader 2 in detecting false security features. Generally, the user does not directly access the background server 3, and the user interacts with the background server 3 through the identifier reader 2. If it is found that an anti-counterfeiting mark 1 is unissued, it can be concluded that it is fraudulent. If it is found that two anti-counterfeiting marks are the same, it can be concluded that one of them is counterfeit, or both are counterfeit. When a counterfeit occurs, the backend server 3 can immediately notify the user, the manufacturer, and the relevant government department to check the source of the counterfeit.
  • the anti-counterfeiting mark 1 includes an invisible point code, a background image 12, and a carrier 13; wherein, the background image 12 is disposed on the carrier 13, the invisible dot code is embedded in the background image 12, and the anti-counterfeiting mark 1 is Its information link.
  • the invisible dot code includes a plurality of color micro dots 11 which are hard to see by the naked eye, and the plurality of color 11 micro dots are arranged in a set encoding manner and are embedded in the background image 12 after being arranged, and finally the generated image is printed. Projected or otherwise displayed on the carrier 13.
  • the color micro-dot 11 in the anti-counterfeit mark 1 is invisible, and the invisible dot code combined by the color micro-dot 11 carries the encoded information of the anti-counterfeit mark 1.
  • the background image 12 of the anti-counterfeiting mark 1 is randomly generated and carries the anti-counterfeit content.
  • the background image 12 is explicit, carrying only the anti-counterfeit content, and does not carry the encoded information.
  • the carrier 13 of the security feature 1 is phenotype, and the carrier 13 includes a paper medium or a plastic medium or a metal medium or a computer screen or a mobile phone screen.
  • the anti-counterfeiting identifier 1 in this embodiment has two types: a static identifier and a dynamic identifier.
  • the static identification means that the one-time imaging of the anti-counterfeit identification content is permanently unchanged after being imaged on the carrier 13.
  • the imaging methods for static identification include: 1) Printing the anti-counterfeit identification content on the carrier 13 using a printer. 2) The contents of the security mark are engraved on the carrier 13 using various engraving machines. In general, the process of statically labeled imaging is based on the carrier and method of use.
  • the characteristic of static identification is that the content on the carrier is static and unchanged.
  • Dynamic identification mainly refers to imaging the content of the anti-counterfeit logo on the screen of a TV, computer or mobile phone.
  • the feature of dynamic identification is that the content on the carrier is dynamic and will change.
  • the coding information includes one-dimensional coding or multi-dimensional coding.
  • the coding information in the anti-counterfeit identifier 1 may be one-dimensional or multi-dimensional.
  • one-dimensional coding means that there is only one number in an anti-counterfeiting sign 1, and there can only be one link hotspot to complete a task.
  • Multi-dimensional coding refers to an area with a multi-dimensional space in an anti-counterfeiting mark. In this area, there may be multiple link hotspots, that is, there may be multiple numbers in one anti-counterfeit mark, or multiple link hotspots. Complete multiple tasks.
  • the code of the anti-counterfeit mark 1 is multi-dimensional code.
  • a general bar code or two-dimensional code is visually very obvious, and it is easy to copy it with a normal copying machine or other simple method.
  • the invisible dot code is visually secret.
  • the invisible dot code is generated by color micro dots 11 which are hard to see with the naked eye, and are arranged in a similar random combination, and then embedded in the background text or image. Because of the visual concealment, it is impossible to copy invisible dot codes with ordinary copiers or some simple methods.
  • the encoding method and encoding content of the invisible dot code are also secret. The position of the color micro-dot 11 in the invisible dot code is nearly random. If you do not know the encoding method, you cannot make a fake code. of.
  • each dot code identifier On each dot code identifier, the arrangement of the color micro dots 11 is unique, like a human fingerprint. No two fingerprints are the same, and the arrangement of the color micro-points 11 without any two anti-counterfeit labels is the same; that is, one anti-counterfeiting mark, one arrangement, and no repetition. It is worth noting that there are many ways to ensure that each permutation is unique. One of them is to give each anti-counterfeit identification 1 a separate number. In this embodiment, the anti-counterfeiting identification 1 is encoded with a 26-digit decimal number. The multi-dimensional code is represented by a 26-digit decimal number. The orderly arrangement of the 26-digit decimal number ensures the uniqueness of the anti-counterfeit mark 1.
  • Figure 3 is a one-to-one correspondence between the anti-counterfeit mark and the 26-digit decimal number in this embodiment. In Figure 3, "54321098765432109876543210" is a 26-digit
  • the common method of counterfeiting is imitation and copying. First, imitate a real thing, and then copy it in large quantities.
  • the uniqueness of the anti-counterfeiting label 1 makes the common counterfeiting method completely unsuccessful, because there is only one authenticity anti-counterfeiting identifier for the same appearance.
  • the system will issue a warning and automatically abolish the counterfeit security identification number in the background server 3.
  • Such anti-counterfeiting mechanisms make counterfeiting more than worth the loss.
  • the anti-counterfeit mark 1 is an identifier having randomness. Because the location of the anti-counterfeit mark 1 and its size define the arrangement of the color micro-dot 11 on the anti-counterfeit mark 1, and because the position and size of the anti-counterfeit mark 1 are random to some extent, the color micro-dot 11 on the anti-counterfeit mark 1 is To some extent also The anti-counterfeiting function of the anti-counterfeit mark 1 is greatly improved, because the completely random event is unpredictable, so that the counterfeiter cannot predict the background image 12 of the anti-counterfeit mark 1, nor can it create a false mark that can be confusing.
  • FIG. 5 is a schematic diagram of the multi-dimensional coding of the anti-counterfeit identifier in the embodiment.
  • the encoding of the anti-counterfeit identifier 1 in this embodiment is multi-dimensional, and includes the encoding of the carrier 13 and the encoding of the anti-counterfeiting identifier 1 position.
  • a complete anti-counterfeit identification 1 code consists of 26 decimal digits. This large capacity can meet the coding needs of all goods produced in the current and future years.
  • For the coding method of the identification please refer to the Chinese patent: ZL03145092, and the US patent: 6256398, 6577748, 6819776, 7123742.
  • the multidimensionality of the code allows any point or any small area on the carrier 13 to be defined by multidimensional coordinates, and the defined area can be defined as a link hotspot.
  • the corresponding link hotspot can be activated to display the link information on the mobile phone.
  • ( ⁇ , ⁇ , ⁇ ) is a point ( ⁇ , ⁇ ) in the description carrier ( ⁇ ).
  • (R, X, Y, Z) is a circle describing the carrier (Z) with (X, Y) as the center and (R) as the radius.
  • hot spot 1 is a circle defined by (R1, X1, Y1, Z1)
  • hot spot 2 is a circle defined by (R2, X2, Y2, Z1).
  • the hot spot 1 is activated, and the link information of the hot spot 1 is displayed on the mobile phone.
  • the hotspot 2 is activated, and the link information of the hotspot 2 is displayed on the mobile phone. If ( ⁇ , ⁇ , ⁇ ) does not fall within any of the logos, no link hotspots are activated and no link information is displayed.
  • Fig. 6 is a schematic diagram showing the high resolution and overlapability of the anti-counterfeit mark in the embodiment.
  • hot spot 1 is a circle defined by (Rl, XI, Yl, Z)
  • hot spot 2 is a circle defined by (R2, X2, Y2, Z).
  • the areas defined by Hotspot 1 and Hotspot 2 overlap each other.
  • the resolution between hotspots is defined by the resolution of multidimensional coordinates. Since the resolution of multidimensional coordinates is usually less than one millimeter, the resolution between hot spots is very high.
  • FIG. 7 is a schematic structural diagram of the identifier interpreter in the embodiment; the identifier interpreter 2 in the embodiment includes a hardware and a software, the hardware is a mobile phone, and the software is an application on the mobile phone.
  • the identifier reader 2 includes an image capturing unit 21, a main control unit 22, a communication unit 23, and a display unit 24; wherein the camera unit 21 is configured to acquire a digitized image of the anti-counterfeit label 1, and the main control unit is configured to control each unit ( The communication unit 23 and the display unit 24) perform corresponding operations, the communication unit 23 is used for communication with the background server 3, and the display unit 24 is for displaying information.
  • the camera unit 21 includes an image sensor and a control software on the mobile phone.
  • the communication unit 23 includes hardware and software related to the Internet.
  • the main control unit 22 and the display unit 24 are common in general mobile phones.
  • the identifier reader 2 has multiple functions: the first function is to verify the authenticity of the anti-counterfeit label, the second function is to provide product information related to the anti-counterfeiting label, and the third function is to identify and belong to the anti-counterfeit identification. Management of rights. It is worth noting that the identification of the authenticity of the anti-counterfeiting mark is actually an authentication of the identity.
  • FIG. 8 is a schematic diagram of a specific structure of an invisible point code anti-counterfeiting system when the identifier is a mobile phone reader in the embodiment; the mobile phone application in the identifier reader 2 has the following features in design and use: 1) The sensor is set in a continuous video state, allowing the recognizer (identification reader) to automatically extract the latest digitized image from the video data stream without user intervention. 2) Use the communication function of the mobile phone and the background server 3 to perform online operation, and jointly identify the identity of the identity. 3) Use the "one-to-many" relationship to associate the anti-counterfeiting mark with the various information of the mark.
  • various information related to the anti-counterfeiting identification is sent from the background server 3 to the mobile phone for display.
  • the user only needs to make one action, that is, align the anti-counterfeiting mark, and the authentication of the anti-counterfeit mark can be completed without pressing any other keys.
  • 6) While providing anti-counterfeiting identification, it also provides anti-counterfeiting identification management functions, and also provides product content and advertising content related to anti-counterfeiting identification.
  • the user can switch between channels (scan channel, logo channel, information channel and advertising channel) with the press of a button.
  • the embodiment further relates to a method for embedding an invisible point code in a digitized file, the flow chart of which is shown in FIG.
  • the method for embedding the invisible point code in the digitized file includes:
  • Step S11 converts a digitized file into a digitized image and uses the digitized image as a background image of the anti-counterfeit logo: In this step, first convert a digitized file into a digitized image, and then use the digitized image as a digital image. Background image of the anti-counterfeiting logo.
  • Step S12 calculates the coordinate position of the current color micro-dot in the background image according to the set encoding mode:
  • press Step S13 calculates the local color of the background image by using the position of the color micro-point as a fixed point:
  • the local color of the background graphic is calculated by using the coordinate position (X, Y) of the color micro-point as a fixed point.
  • Step S14 Embed the reverse color or yellow color of the local color in the position of the fixed point in the background image:
  • the reverse color or yellow color of the local color is embedded in the fixed point position (X, Y) in the background image.
  • Step S15 determining whether all the color micro-dots are embedded in the background image: In this step, determining whether all the color micro-dots are embedded in the background graphic, and if the result of the determination is yes, executing step S16; otherwise, Step S17 is performed.
  • Step S16 Ends the embedding operation: If the result of the above step S15 is YES, the step is executed. In this step, the embedding operation is ended.
  • Step S17 Acquire the next color micro dot: If the result of the above step S15 is no, the present step is executed. It is worth mentioning that after performing this step, the process returns to step S12 until all the color micro dots are embedded in the background image.
  • the invisible coded content of the anti-counterfeit mark can be directly embedded in a digitized file, and the layout of the file itself does not need to be modified. This method provides convenience in use, improves the difficulty of counterfeiting, and does not destroy the aesthetics of the original document.
  • This embodiment further relates to a method for forming an anti-counterfeit label, and a flowchart thereof is shown in FIG.
  • the method for forming the security label includes:
  • Step S21 randomly generates a digitized file and converts it into a digitized image:
  • a digitized file is randomly generated, and the digitized file is converted into a digitized image.
  • Step S22 transmitting the encoded information or the digitized image of the anti-counterfeit identifier to the background server:
  • the code of the anti-counterfeit identifier or the digitized image (the image of the digitized file) is transmitted to the background server, so that the anti-counterfeit identifier is The background image is compared with the corresponding background image in the background server.
  • Step S23 embed the invisible point code of the anti-counterfeiting identifier in the digitized file:
  • the invisible point code of the anti-counterfeiting identifier (which is encoded into multi-dimensional encoding) is embedded in the digitized file, and the embedding method is shown in FIG. 9 above.
  • Step S24 setting the information fed back when the anti-counterfeiting identifier is queried and transmitting the feedback information to the background server: in this step, when the anti-counterfeiting identifier is queried, the information (response information) of the entire page of the interpreter is identified, and the definition is The content and related data are transmitted to the backend server; the feedback information includes relevant authentication results or/and text and/or images or/and web pages and/or video or/and advertisements.
  • Step S25 Prints the digitized file embedded with the invisible dot code on the carrier:
  • the digitized file in which the invisible dot code is embedded is printed on the carrier (tag carrier).
  • Step S26 Arranging a plurality of anti-counterfeit labels from the printed carrier arbitrarily or according to a certain rule: In this step, a plurality of anti-counterfeit labels are divided (cut out) from the printed carrier arbitrarily or according to a specific method. , it can be attached to the product as an anti-counterfeit label.
  • the security label since the digitized files are randomly generated, the randomness of each of the security labels can be ensured. And because of the use of invisible color micro-dots and multi-dimensional encoding, it is possible to ensure the privacy and uniqueness of each security label. In addition, since all the security labels are on the same carrier and have the same response when querying, there is no need to define a special area for each security label, and many security labels can be arbitrarily cut out from the carrier. use. Such a method of formation can greatly facilitate the user.
  • this method is not only a method of forming an anti-counterfeit label, but also a method of browsing related information provided by the manufacturer or the manufacturer on the product or on the anti-counterfeit label or on the trademark or on the package.
  • This embodiment further relates to a method for interpreting an anti-counterfeit mark, and a flowchart thereof is shown in FIG.
  • the interpretation method uses the built-in camera sensor of the mobile phone to obtain a digitized image of the anti-counterfeit logo, and uses the built-in computer of the mobile phone to decode the code embedded in the image.
  • the method further utilizes the built-in communication function, timing and positioning function of the mobile phone to transmit the location of the mobile phone, the identity of the mobile phone, the scanning time and the scanned image, etc. to the background server during scanning.
  • the interpretation method is operated online with the background server to comprehensively identify the authenticity of the logo and display the identification result on the screen of the mobile phone.
  • the interpretation method includes:
  • Step S31 identifies the interpreter scanning the anti-counterfeiting identifier:
  • the identifier interpreter scans the anti-counterfeiting identifier.
  • the anti-counterfeit logo is scanned using the camera (camera) function of the logo reader.
  • Step S32 extracting the current digitized image from the video data stream of the identifier reader:
  • Step S33 extracts the invisible point code from the digitized image, and decodes it to obtain a multi-dimensional coordinate:
  • the invisible point code is extracted from the digitized image, and is decoded to obtain a multi-dimensional coordinate (X, Y).
  • ( ⁇ , ⁇ ) is the position of the invisible point code on the carrier
  • ( ⁇ ) is the encoding of the carrier.
  • Step S34 The decoded parameter is transmitted to the background server:
  • the decoded parameter is transmitted to the background server (background system), and the decoded parameters include scan image, multidimensional coordinates, query time, query location, and identifier reader. Identity Information.
  • Step S35 The background server uniquely identifies the anti-counterfeiting identifier and returns the authentication result to the identifier interpreter: in this step, the background server (background system) is used to uniquely identify the identifier.
  • the parameters required for identification include multidimensional coordinates, query time, query location and identification reader identity information; if the authentication fails, the result is transmitted back to the identification reader (specifically the mobile phone) and displayed on the identification reader (specifically the mobile phone) Related failure information.
  • Step S36 The background server compares the scanned image with the background image stored in advance and returns the comparison result to the identifier reader: in this step, the background server (background system) is used to compare the scanned image with the previously stored logo background image. Correct. If the comparison fails, the result is sent back to the phone and the relevant failure message is displayed on the phone.
  • the background server background system
  • Step S37 querying the background database, extracting the first data corresponding to the coordinates, and transmitting the first data back to the identifier reader: In this step, querying the background database, extracting the first data corresponding to the multidimensional coordinates, and A data is sent back to the phone.
  • Step S38 displaying the first data on the identifier reader: In this step, displaying first data corresponding to the decoded coordinates (multidimensional coordinates) on the mobile phone, the first data including the identification result or/and the related text or / and images or / and web pages / / and short films.
  • the anti-counterfeiting identifier has three security features: privacy, uniqueness, and randomness. These three characteristics are three layers of anti-counterfeiting protection for anti-counterfeiting. Concealment includes the content of the anti-counterfeit mark is almost invisible to the naked eye, and the anti-counterfeit mark code is not disclosed, which protects the appearance and coded content of the anti-counterfeit mark. Uniqueness means that the visual image of the anti-counterfeit logo is unique. Just like a human fingerprint, no two anti-counterfeit logos are the same, and the protection anti-counterfeit logo cannot be copied in large quantities.
  • Randomness means that the content of some anti-counterfeiting labels is random and unpredictable, and its protection of anti-counterfeiting labels cannot be impersonated.
  • the above-mentioned interpretation method in this embodiment combines these three characteristics, so that the anti-counterfeiting function of the anti-counterfeiting mark is exponentially increased. If a key is used to open the door for a metaphor, the comprehensive identification of the anti-counterfeiting mark requires three keys to open three doors. The first key is the encoding method, and the first door is the colored micro dot in the anti-counterfeiting mark. Only knowing the correct encoding method can successfully decode the color micro dots in the logo, thus obtaining the second key.
  • the second key is a multi-dimensional coordinate
  • the second door is the identification of the uniqueness of the anti-counterfeiting mark.
  • the mutual correspondence between the multidimensional coordinates and the anti-counterfeiting mark is predefined.
  • statistical data such as query time, location, number of times, and the mobile phone used for the inquiry, etc., it is possible to accurately determine whether a number to be queried (26-digit decimal number of the anti-counterfeit mark in this embodiment) only one.
  • the number and query statistics of each anti-counterfeit identifier are stored in the background server. Only when the query number is valid, has been issued, and is the only condition, the third key can be extracted from the background server.
  • the third key is the background image of the anti-counterfeit logo
  • the third door is the comparison of the extracted background image with the background image of the identified logo. The third door can only be opened when the extracted background image matches the background image of the identified logo.
  • step S33 can be further refined, and a specific flowchart thereof is shown in FIG. In Figure 12, the above step S33 further includes:
  • Step S331 automatically detects various parameters of the invisible point code from the digitized image:
  • parameters of various invisible point codes are automatically detected from the digitized image, and the detected parameters include the coding type and the coding dimension. Number, size and orientation, etc.
  • the digitized image is obtained using the camera function of the mobile phone.
  • Step S332 Decoding the invisible point code according to the detected parameter to obtain a multi-dimensional coordinate:
  • the invisible point code is decoded according to the detected parameter to obtain a multi-dimensional coordinate, for example: ( ⁇ , ⁇ , ⁇ .
  • the dimension of the multidimensional coordinates is determined according to the parameters of the automatically detected invisible point code. For details, please refer to Chinese patent: ZL03145092, and US patents: 6256398, 6577748, 6819776, 7123742. This decoding operation utilizes the computing functions of the mobile phone.
  • Step S35 actually provides an identification method for the uniqueness of the anti-counterfeiting mark.
  • the identification principle of the identification method is that the same anti-counterfeit mark cannot appear in different places in a very similar time. If something like this happens, then one of the anti-counterfeit signs is fake or two Together, the true security logo is often associated with the true security feature. Because each security mark (the finished product is a label) corresponds to a batch number, the probability of the true security mark of the same batch number is high.
  • the probability of false anti-counterfeiting labels being together in the sales channel is also very high. If a fake anti-counterfeiting mark often appears in a place, then the probability of a fake anti-counterfeit mark with the same batch number in the place is particularly high.
  • Another basis for the identification is that the probability that the fake anti-counterfeiting identifier is queried is higher than the probability that the true anti-counterfeiting identifier is queried, and the probability that the same batch number or the same encoded fake anti-counterfeiting identifier is queried is particularly high. Based on the principles of these identifications and probability features, a mathematical model can be built to calculate the probability of uniqueness.
  • a fake anti-counterfeit logo can be made exactly like a real anti-counterfeit logo, but it is difficult to imitate the content and query history of a true anti-counterfeit logo.
  • Such an interpretation method directly challenges the technology of fraud, making fraud very difficult. Even when the fake anti-counterfeit mark is exactly the same as the true anti-counterfeit mark, it can be recognized.
  • the query phone When the query location is the same, the query phone is different, and the query time is different, even if the query frequency is very high, the unique probability of the identifier being queried is still high; when the query location is different, the query phone is different, and the query time is similar, The query ID is certainly not unique, because an anti-counterfeit logo cannot appear in two places at the same time.
  • the query statistics of each anti-counterfeit identifier are stored. Only when the anti-counterfeit identifier that is queried is valid, has been issued, and only under the condition of a high probability, the unique identification can be passed.
  • step S35 further includes:
  • Step S351 transmitting the code of the anti-counterfeit identifier, the identity of the identifier reader, the query time, and the query location to the background server:
  • the scan parameters are: the number of the anti-counterfeit identifier (code), the characteristics of the mobile phone (identity of the identifier reader) ), query time and query location, etc. are sent to the background server (background system).
  • Step S352 calculates the probability of uniqueness according to the code of the identifier, the identity of the identifier, the query time, the query location, and the scan record: In this step, the unique probability is calculated according to the scan parameter and the scan record.
  • step S353 it is determined whether the probability is greater than a preset threshold. In this step, it is determined whether the calculated likelihood is greater than a preset threshold. If the result of the determination is yes, step S354 is performed; otherwise, step S355 is performed. .
  • Step S354 returns the information of the successful authentication to the identifier reader display: if the result of the above step S353 is YES, that is, the uniqueness authentication is successful, the step is executed. In this step, the information of the successful authentication is returned to the identification reader display.
  • Step S355 returns the information of the authentication failure to the identification reader display: if the determination result of the above step S353 is negative, that is, the uniqueness verification fails, this step is performed. In this step, the information of the authentication failure is returned to the identification reader display.
  • Step S36 actually provides an authentication method for the randomness of the anti-counterfeiting identifier.
  • a prerequisite for the authentication method of the randomness is to pre-store a completely-identified background graphic in the background system (background server), so as to be obtained from the scan.
  • the background image is relatively large. It is worth noting that the background image obtained by the scan is incomplete and distorted.
  • step S36 further includes:
  • Step S361 extracting the first background image of the anti-counterfeit mark from the scanned image:
  • the first background image of the anti-counterfeit mark is extracted (extracted) from the scanned image (in order to distinguish from the background image below,
  • the background image extracted in this step is called the first background image).
  • Step S362 extracts a second background image of the anti-counterfeiting identifier corresponding to the encoding of the anti-counterfeiting identifier from the background database, and compares the scanned first background image with the second background image extracted in the background database to obtain a The first value describing the degree of similarity:
  • the second background image of the anti-counterfeiting identifier corresponding to the anti-counterfeit identification code is extracted from the background database, and the first background image and the background database are scanned.
  • the two background images are compared to obtain a first value describing the degree of similarity. How to compare two images is a mature and common technique.
  • Step S363 determining whether the first value is greater than the set value: In this step, determining whether the first value is greater than the set value, if the result of the determination is yes, executing step S364; otherwise, executing step S365.
  • Step S364 returns the information of the successful authentication to the identifier reader for display: If the result of the above step S363 is YES, that is, the randomness authentication is successful, the step is executed. In this step, the information of the successful authentication is returned to the identification reader for display.
  • Step S365 returns the information of the authentication failure to the identifier reader for display: If the result of the above step S363 is negative, that is, the randomness authentication fails, this step is performed. In this step, the information of the authentication failure is returned to the identification reader for display.
  • the methods of pseudo-identification are:
  • Step S41 transmitting the query parameter of the identifier to the background server:
  • the query parameter of the identifier is transmitted to the background server;
  • the query parameters include the security identifier code, the query time, the query location, and the identity of the query identifier reader. Or feature.
  • Step S42 The background server collects the query record related to the anti-counterfeit identification code: In this step, the background server collects the query record related to the anti-counterfeit identification code of the query; the query record includes the anti-counterfeit identification code (strictly speaking, the anti-counterfeit tag coding) The batch number of the corresponding anti-counterfeit identification or / and the distribution frequency of the anti-counterfeit identification or / and the distribution of the query time or / and the distribution statistics of the query location or / and the frequency of counterfeiting at the query location or / and the frequency of counterfeiting with the same batch number Or / and the frequency of counterfeiting with the same encoding.
  • Step S43 calculates the probability of uniqueness according to the query parameter and the data in the query record:
  • the probability of uniqueness is calculated according to a mathematical model.
  • the mathematical model can be a simple method, such as: performing a linear weighted calculation on each input data, or using other more complicated methods.
  • Step S44 determines whether the probability is greater than a preset threshold: In this step, it is determined whether the calculated likelihood is greater than a preset threshold, and if so, step S45 is performed; otherwise, step S46 is performed.
  • Step S45 It is determined that the anti-counterfeiting flag is true: if the result of the above step S44 is YES, the step is executed. In this step, it is determined that the anti-counterfeiting flag is true, that is, the uniqueness is successfully authenticated, and the successful result is returned to the identifier interpretation. Display.
  • Step S46 It is determined that the anti-counterfeiting flag is false: If the result of the above step S44 is no, the step is executed. In this step, it is determined that the anti-counterfeiting flag is false, that is, the uniqueness authentication fails, and the result of the authentication failure is returned to the identifier interpretation. Display.
  • the basis for distinguishing between true and false is the uniqueness of the anti-counterfeiting mark.
  • the parameters required to distinguish between true and false include the query parameters of the identifier reader and the query records of the anti-counterfeit identifiers in the background server. Specifically, the rule of distinguishing between true and false is to see if the same anti-counterfeiting mark appears in a different place in a very similar time. If there is, one of the anti-counterfeit marks is false or both anti-counterfeit marks are false.
  • Another rule for distinguishing between true and false is that the object is clustered together, that is, the fake anti-counterfeiting mark is often associated with the fake anti-counterfeit mark, and the true anti-counterfeit mark is often associated with the true anti-counterfeit mark.
  • Another rule to distinguish between true and false is that the probability of a false security logo being queried is particularly high. According to the mode in which the anti-counterfeiting mark is queried (including time, place, number of times, data such as the identifier reader used for the inquiry), the authenticity of the anti-counterfeit mark can be accurately determined.
  • a fake anti-counterfeit logo can be created exactly like a real anti-counterfeit logo, but it is difficult to imitate the content and query history of a true anti-counterfeit logo. Such identification methods directly challenge the technology of fraud, making fraud very difficult. Even when the fake anti-counterfeit mark is exactly the same as the true anti-counterfeit mark, it can be recognized.
  • the embodiment further relates to a method for changing the ownership of an anti-counterfeiting identifier, and the flowchart thereof is as shown in FIG. 16.
  • the anti-counterfeiting identification attribute refers to the belonging relationship between the anti-counterfeiting identification and the identifier interpreter (in this embodiment, specifically the mobile phone).
  • An anti-counterfeiting logo can have several tenure states: 1) single, no right to belong to the person, 2) engaged, pending ownership, 3) married, entitled to personal status.
  • the anti-counterfeiting logo can enter the engaged state from a single person; it can also enter the married state from the engagement; it can also enter the single state from the married state; it can also enter another married state from one married state.
  • the anti-counterfeiting logo cannot enter the engaged state directly from the married state. Changing the security of the anti-counterfeiting logo is to establish or change the relationship between the anti-counterfeiting logo and the user of the mobile phone. It is worth noting that changing the security of the anti-counterfeiting logo can be applied to the certification of second-hand goods.
  • the management methods involved include: anti-counterfeit identification, mobile phones with camera and Internet access, and back-end servers with online functions.
  • the method for changing the security of the security identification includes:
  • Step S51 proposes an anti-counterfeiting identification change request:
  • the method of proposing the anti-counterfeiting identification change request (the right change request) is similar to the decoding method of the anti-counterfeit identification image.
  • the implementation of the anti-counterfeiting identity change request is implemented by scanning the anti-counterfeiting identifier.
  • Step S52 Display the ownership change menu according to the ownership status of the anti-counterfeiting identifier: In this step, the ownership change menu is displayed according to the ownership status of the anti-counterfeiting identifier.
  • Step S53 selects an option from the change menu and performs related operations of the option:
  • an option is selected from the change menu and the related operation of the option is performed; the above options include obtaining the ownership of the security mark or assigning the ownership of the anti-counterfeit mark or giving up the anti-counterfeit mark. ownership.
  • the user enters the operation of acquiring the security identification ownership.
  • the user After the user selects the option for ownership of the anti-counterfeiting mark, the user is confirmed to have the anti-counterfeit mark according to the characteristics of the mobile phone, and then enters the operation related to the ownership of the anti-counterfeiting mark.
  • the user chooses to abandon the option of ownership of the security mark, confirm that the user has the security mark according to the characteristics of the phone, and then update the database record, so that
  • the above-described flowchart of the method for acquiring the ownership of the anti-counterfeit mark is as shown in FIG.
  • the method for obtaining ownership of the security feature includes:
  • Step S61 displays the anti-counterfeiting identification ownership form and prompts the user to input the form content:
  • the anti-counterfeiting identification ownership form is displayed, and the user is prompted to input the form content.
  • Step S62 The system determines, according to the scan record, whether the user has the control right of the anti-counterfeit identifier: In this step, the ownership of the anti-counterfeit identifier enters the judgment period, and the system determines whether the user has the control right of the anti-counterfeit identifier according to the scan record, and if the judgment result is yes Then, step S62 is performed; otherwise, step S64 is performed. It is worth mentioning that during the judgment period, the user can scan the anti-counterfeiting mark by changing the time or place to demonstrate the control of possessing the anti-counterfeiting mark. It is worth mentioning that, in this embodiment, the mobile phone user has sufficient control over the anti-counterfeiting identifier to be equal to the ownership of the identified object.
  • Step S63 The user obtains the ownership of the anti-counterfeit flag, and the system updates the ownership record in the database: If the result of the above step S62 is YES, the step is executed. In this step, according to the scan record, after the system confirms that the user has the control right of the anti-counterfeit mark, the system will display the security status judgment of the anti-counterfeit mark, and the anti-counterfeit mark exits the judgment period and enters the state of the right owner. At the same time, the user obtains ownership of the anti-counterfeiting identity and the system also updates the database ownership record.
  • Step S64 quits the current operation: If the result of the above step S62 is no, the present step is executed. In this step, the current operation is exited.
  • the background server is an arbitrator's role, and one of its duties is to verify the authenticity of a claim of ownership and make a judgment on the claim. If the marker is in a public place, anyone can use the mobile phone to scan the logo to make a claim. Only after the claim is verified, the background server makes the decision of the ownership and updates the ownership record in the database.
  • the method of verifying the ownership claim is that the back-end server acts as an arbitrator, and the mobile phone user's control over the anti-counterfeiting identification is determined according to the anti-counterfeiting identification query record.
  • the authentication method of the tenure claim is to require the user to scan the anti-counterfeit logo at different times or places to demonstrate possession of control over the anti-counterfeiting logo.
  • the principle of the method is to effectively determine whether the mobile phone user has actual control over the identifier based on data such as the time, location and characteristics of the mobile phone. For example, if a mobile phone user scans the same anti-counterfeit logo in a different location, the probability that the user has control is very high. If a user is in the same place and scans the same anti-counterfeit identifier multiple times at different times, the chances of the user having control are also very high. When the probability is higher than a threshold value, the ownership is determined to belong to the mobile phone user. In addition, the verification and judgment of the tenure claims take a period of time and is called a pending period. The length of this waiting period is not certain. Only when the system receives sufficient scan data, the system makes a ruling.
  • the flow chart of the method for assigning the ownership of the anti-counterfeiting mark is as shown in FIG. 18.
  • the anti-counterfeit mark can be displayed on the screen of the mobile phone, and the content of the anti-counterfeit mark can also be read from the screen of the mobile phone.
  • the transfer of the ownership of the anti-counterfeiting mark does not need to be pending.
  • the transfer of ownership is done through an action, that is, the recipient scans the identity of the logo on the mobile phone with the mobile phone. This ownership displays both visual information that communicates with the user and functional information that communicates with the machine. In this action, the ownership indicates that the content is given to the viewer and the recipient, and the special code in it informs the backend server to transfer ownership of the security token from the transferor to the recipient.
  • the method for assigning ownership of the anti-counterfeiting mark includes:
  • Step S71 Generate a background image according to the content of the ownership of the security symbol: In this step, a background image is generated according to the content of the ownership of the security symbol.
  • Step S72 adding the code of the transfer ownership to the code of the transfer security mark to form the first code, and embedding the first code into the background image of the ownership:
  • the code of the transfer ownership is added to the transfer security mark.
  • the first code is formed on the code, and the first code is embedded in the background image of the ownership.
  • Step S73 displaying the ownership embedded in the first code on the first identifier reader of the transfer party: in this step, specifically, on the first identifier reader (specifically, the mobile phone of the transferor) of the transferor (transfer)
  • the ownership code embedded in the special code (first code) is displayed.
  • Step S74 The receiver scans the ownership of the first identifier reader of the transfer party with the second identifier reader: in this step, the receiver (recipient) scans the transfer party with the second identifier reader (receiver's mobile phone) ( Ownership of the first identification reader (the transferor's mobile phone) on the ownership.
  • Step S75 The recipient confirms the change of ownership on the second identification reader: In this step, the recipient confirms the change of ownership on the second identification reader (receiver's mobile phone).
  • the database records are updated to transfer the ownership of the anti-counterfeiting mark from the transferor (granter) to the recipient (recipient).
  • the anti-counterfeit identification not only provides visual depiction of images and images, but also provides a hidden link hotspot, and links the anti-counterfeit identification and related identification information through the network. This anti-counterfeit mark can be widely used in various fields.
  • Anti-counterfeit identification content can be printed directly on paper items such as tickets, stamps, banknotes, stocks, confidential documents, land rights, housing rights, and the like.
  • Anti-counterfeiting logo content can also be printed directly on plastic items, such as credit cards, financial cards, driver's licenses, identification cards, licenses, ID cards, passports, etc.
  • the anti-counterfeiting label content can also be printed directly on metal objects.
  • Anti-counterfeit identification content can even be displayed on the screens of TVs, computers and mobile phones. In addition to this, it is also possible to pre-manufacture an anti-counterfeit label and then attach the anti-counterfeit label to the item.
  • Such applications include packaging of general merchandise and merchandise, such as: food, medicines, boutiques, cigarettes, wine, sporting goods, and electronics.
  • the embodiment provides a set of invisible point code anti-counterfeiting system with high technical threshold, high anti-counterfeiting strength and convenient use.
  • the invisible point code anti-counterfeiting system integrates digital anti-counterfeiting technology and printing process, and the combined operation of the mobile phone identification and the online database is found to be counterfeit.
  • the first time the user will be automatically notified, the manufacturer and the relevant government departments.
  • Such measures provide a mechanism for automatic market supervision, enabling the relevant government departments to immediately investigate the source of counterfeiting and more effectively combat counterfeiting in the market.
  • a small area of the anti-counterfeit identifier may include a plurality of link hotspots, and has multiple functions, and the areas occupied by the link hotspots may be independent of each other, or may overlap each other, and link The resolution between hotspots can be as small as a few millimeters.
  • the randomness and readability of anti-counterfeiting labels are contradictory. Increasing randomness reduces readability and improves readability and reduces randomness. Similarly, the privacy and readability of anti-counterfeiting labels are also contradictory.
  • the current technology there are many technologies with high readability, low concealment or low randomness, such as case 2 in the background art; there are also techniques with high randomness and low readability, such as case 3 in the background art; There are also techniques that are high in privacy and low in readability, such as Case 4 in the background.
  • the interpretation method solves the contradiction between concealment, randomness and readability, so that the anti-counterfeiting logo can have good concealment, complete randomness and 100% machine reading ability.
  • This embodiment has a new breakthrough in the security of anti-counterfeiting.
  • the ability to identify counterfeiting has long been an important indicator of anti-counterfeiting technology.
  • the existing identification technology is immediately invalid.
  • the recorded record can be effectively judged based on the uniqueness and range of the security mark to be counterfeited.
  • the present embodiment provides a self-service interpretation method, which is characterized by high technical quality, is not easy to be cracked, and detection is convenient and fast.
  • the user uses the mobile phone to identify the authenticity of the product. It only needs one action (that is, the anti-counterfeiting mark). It does not need to press any other keys, and only a few seconds can get an accurate answer.
  • the weakest place is the secret of product manufacturing. It is easy to find the way to crack when the fraudulent person gets the secret of manufacturing or steals the coding method.
  • the embodiment combines various anti-counterfeiting measures (such as anti-counterfeiting identification code, background graphic, mobile phone recognizer or mobile phone reader, background server, authentication method, etc.), even in the case where the encoding method is stolen and the identification manufacturing secret is disclosed.
  • the anti-counterfeiting system is still safe.

Abstract

The present invention relates to an invisible point code anti-counterfeiting system, and a method for embedding an invisible point code, forming an anti-counterfeiting tag, reading an anti-counterfeiting identification, authenticating the anti-counterfeiting identification, and changing the ownership of the anti-counterfeiting identification. The system comprises the anti-counterfeiting identification, an identification reader for authenticating the anti-counterfeiting identification by acquiring the digital image of the anti-counterfeiting identification, and a background server for storing the code of the issued anti-counterfeiting identification and the related commodity authentication information, and helping the identification reader to authenticate the anti-counterfeiting identification; the anti-counterfeiting identification comprises the invisible point code, background image-text and a carrier; and the background image-text is formed on the carrier, and the invisible point code is embedded in the background image-text and used for linking the anti-counterfeiting identification and the information thereof through a network. By implementing the invisible point code anti-counterfeiting system and the method for embedding the invisible point code, forming the anti-counterfeiting tag, reading the anti-counterfeiting identification, authenticating the anti-counterfeiting identification and changing the ownership of the anti-counterfeiting identification, the beneficial effects of high technical barrier, convenient use and instant identification are achieved.

Description

、 、 、  , , , ,
技术领域 Technical field
本发明涉及防伪技术领域, 更具体地说, 涉及一种一种隐形点码防伪系统、 在数字化文件中 嵌入隐形点码、 防伪标签的形成、 防伪标识的解读、 鉴别防伪标识真假及改变防伪标识权属的方 法。  The present invention relates to the field of anti-counterfeiting technology, and more particularly to an invisible point code anti-counterfeiting system, embedding invisible point code in a digital file, forming an anti-counterfeit tag, interpreting an anti-counterfeit mark, authenticating the anti-counterfeit mark, and changing the anti-counterfeiting. The method of identifying ownership.
背景技术 Background technique
案例一, 在中国专利申请号为 95203425. 5 (申请日 1995年 2月 7日), 标题为 "密码防伪标 识物" 中,其防伪标识物由防伪信息载体印设的代码、 密码 ( 防伪信息 ) 和遮盖层构成; 代码 和密码组成编码存储在为消费者提供验证密码服务的计算机识别系统数据库中,消费者可通过电 话向计算机识别系统数据库拨入编码来验证产品的真伪,它将鉴别产品真伪这种本来复杂的技术 行为转化为打电话验证编码的简单行为,其不易伪造,易于识别,中国防伪行业协会组织推广的 "全国电码电话防伪系统工程"采用了该项专利技术。 然而,在实践中却发现存在回收防伪标识 物造假的现象及一码多印的造假的现象,还发现存在非法拷贝编码造假的现象。  Case 1, in China Patent Application No. 95203425. 5 (application date February 7, 1995), titled "Password Anti-Counterfeit Mark", the code and password (anti-counterfeiting information) of the anti-counterfeit mark printed by the anti-counterfeit information carrier And the cover layer; code and password composition code stored in the computer identification system database that provides the consumer with the verification password service, the consumer can dial the code to the computer identification system database by phone to verify the authenticity of the product, it will identify The original and complicated technical behavior of product authenticity is transformed into the simple behavior of telephone verification coding. It is not easy to forge and easy to identify. The National Electric Code Telephone Anti-Counterfeiting System Project promoted by the China National Defense Industry Association has adopted this patented technology. However, in practice, it has been found that there is a phenomenon of fraudulent recovery of anti-counterfeiting marks and a phenomenon of falsification of one yard and multiple prints. It is also found that there is a phenomenon of illegal copying and coding fraud.
案例二, 在中国专利申请号为 200520089735. 2 (申请日 2005年 3月 17日), 标题为 "能够 识别商品真伪的手机" 中, 真伪识别器为手机, 防伪标识是一般的二维条码。 该技术的特点是可 识别性高, 隐秘性低, 随机性低, 很容易用普通的复印机或其它简单的方法来仿冒。 另外, 其实 施方案的技术门槛低, 容易被冒名假造。  Case 2, in the Chinese patent application number is 200520089735. 2 (application date March 17, 2005), the title is "the mobile phone that can identify the authenticity of the goods", the authenticity recognizer is a mobile phone, and the anti-counterfeiting mark is a general two-dimensional Bar code. The technology is characterized by high recognizability, low concealment, low randomness, and easy to counterfeit with ordinary copiers or other simple methods. In addition, the technical threshold of the scheme is low and it is easy to be impersonated.
案例三,在中国专利申请号为 201020646885. X (申请日 2010年 12月 8 日), 标题为 "一种 防伪标识物" 中, 防伪标识上印设有设查询编码和纹密防伪。 另外还提供有查询电话号码和查询 网址。 用户可登陆网站,输入查询码进行查询,并且观查比对纹密条数、 颜色、 位置和形状。 该技 术的特点是随机性高, 可识别性低。 该技术在使用上的不方便性必然导致查询率低, 给一码多印 的造假留下漏洞。  Case 3: In the Chinese patent application number 201020646885. X (application date December 8, 2010), the title is “an anti-counterfeit mark”, and the anti-counterfeiting mark is printed with the query code and the anti-counterfeiting. An inquiry phone number and a query URL are also available. Users can log in to the website, enter the search code to query, and check the number, color, position and shape of the matching. This technology is characterized by high randomness and low recognizability. The inconvenience of the technology inevitably leads to a low query rate, leaving a loophole for the fraud of one yard and multiple prints.
案例四,在中国专利申请号为 01220331228. 5 (申请日 2012年 7月 9日), 标题为 "手机拍码 信息比对查询防伪标识及其识别系统" 中, 真伪识别器为手机, 防伪标识是多层的, 有刮墨层、 信息层和镂空全息层等等。 在使用时需先刮掉标识的刮墨层再对镂空全息层摄像。 该技术的特点 是隐秘性高, 可识别性低。 该技术的弱点是对防伪标识作破坏性地改变, 导致用户必须 "先买后 查", 而不能 "先查后买"。  Case 4, in China patent application number is 01220331228. 5 (application date July 9, 2012), titled "mobile phone code information comparison check security identification and its identification system", the authenticity recognizer for mobile phones, anti-counterfeiting The logo is multi-layered, with a squeegee layer, an information layer and a hollow holographic layer. In use, it is necessary to scrape off the identified ink-repellent layer and then image the hollowed-out holographic layer. The technology is characterized by high privacy and low recognizability. The weakness of this technology is the destructive change of the anti-counterfeiting label, which leads to the user having to "buy and check first" instead of "checking and buying first".
中国第一次明确提出防伪技术产品八个通用技术要求, 其内容如下: 1 ) 身份唯一性: 防伪技术 产品防伪识别特征的唯一性和不可转移性。 2 ) 稳定期: 在正常使用条件下, 防伪技术产品的防 伪识别特征可持续保持的最短时间。 3 ) 安全期: 在正常使用条件下, 防伪技术产品防伪识别特 征被成功仿制的最短时间。 4)防伪力度: 识别真伪、防止假冒伪造功能的持久性与可靠程度。 5 ) 使用适应性: 防伪技术产品的防伪识别特征能与标的物或服务对象使用要求相适应的能力。 6 ) 识别性能: 防伪技术产品的防伪识别特征能通过感官或机器在要求的识别时间内正确识别。 7 ) 使用环境要求: 防伪技术产品的防伪性能应能满足标的物的正常使用环境要求。 8 ) 技术安全保 密性: 设计、 制作防伪技术产品的技术应具有安全保密性。 For the first time, China clearly proposed eight general technical requirements for anti-counterfeiting technology products. The contents are as follows: 1) Identity uniqueness: Anti-counterfeiting technology The uniqueness and non-transferability of product anti-counterfeiting identification features. 2) Stabilization period: Under normal conditions of use, the anti-counterfeiting identification feature of anti-counterfeiting technology products can be kept for the shortest time. 3) Safety period: Under normal conditions of use, the anti-counterfeiting technology product anti-counterfeiting feature is the shortest time to be successfully copied. 4) Anti-counterfeiting strength: Identify the authenticity and the durability and reliability of the counterfeit and counterfeit functions. 5) Adaptability: The anti-counterfeiting feature of anti-counterfeiting technology products can be adapted to the requirements of the target or service object. 6) Recognition performance: The anti-counterfeiting feature of the anti-counterfeiting technology product can be correctly identified by the sense or machine within the required identification time. 7) Environmental requirements for use: The anti-counterfeiting performance of anti-counterfeiting technology products should meet the requirements of the normal use environment of the target materials. 8) Technical security and confidentiality: The technology for designing and manufacturing anti-counterfeiting technology products should be secure and confidential.
对于真伪的鉴别, 虽然全世界有很多方法, 但是防伪力度高又方便使用的方法却很少。 这其 中的主要两个原因是: 1 ) 技术门槛低、 技术易被破解、 易被大量的复制。 2 ) 使用不方便和无法 即时鉴别。 有些方法需要专家的鉴定, 有些方法需要数日甚至数周的时间。 这两个原因常常导致 用户对防伪的实际效果丧失信心。  For the identification of authenticity, although there are many methods in the world, there are few methods for high anti-counterfeiting and convenient use. The main reasons for this are: 1) The technical threshold is low, the technology is easy to be cracked, and it is easy to be copied in large quantities. 2) Inconvenient to use and unable to identify instantly. Some methods require expert identification, and some methods take days or even weeks. These two reasons often lead to users losing confidence in the actual effect of anti-counterfeiting.
发明内容 Summary of the invention
本发明要解决的技术问题在于, 针对现有技术的上述技术门槛较低、 使用不方便、 无法即时 鉴别的缺陷, 提供一种技术门槛较高、 使用方便、 能即时鉴别的隐形点码防伪系统、 在数字化文 件中嵌入隐形点码、 防伪标签的形成、 防伪标识的解读、 鉴别防伪标识真假及改变防伪标识权属 的方法。  The technical problem to be solved by the present invention is to provide an invisible point code anti-counterfeiting system with high technical threshold, convenient use, and instant identification for the defects of the prior art, such as low threshold, inconvenient use, and instant identification. Embedding invisible point codes, forming anti-counterfeit tags, interpreting anti-counterfeit tags, authenticating anti-counterfeit logos, and changing the ownership of anti-counterfeiting logos in digital files.
本发明解决其技术问题所采用的技术方案是: 构造一种隐形点码防伪系统, 包括用于传递商 品信息的防伪标识、 用于通过获取所述防伪标识的数字化图像以鉴定所述防伪标识真伪的标识解 读器以及用于储存已发行的所述防伪标识的编码和相关商品鉴定信息、 并辅助所述标识解读器对 背景图文设置在所述载体上, 所述隐形点码嵌入在所述背景图文中并通过网络将所述防伪标识及 其信息链接。 The technical solution adopted by the present invention to solve the technical problem is: constructing an invisible point code anti-counterfeiting system, comprising an anti-counterfeit identifier for transmitting commodity information, and for identifying the anti-counterfeit identifier by acquiring a digitized image of the anti-counterfeit identifier a pseudo-identifier and a code for storing the issued anti-counterfeit identification and related item identification information, and assisting the identification reader pair The background image is disposed on the carrier, and the invisible dot code is embedded in the background graphic and links the anti-counterfeiting identifier and its information through a network.
在本发明所述的隐形点码防伪系统中, 所述标识解读器包括用于获取所述防伪标识的数字化 图像的摄像单元、 用于控制各单元进行相应操作的主控单元、 用于与所述后台服务器进行通讯的 通讯单元和用于显示信息的显示单元。  In the invisible point code anti-counterfeiting system of the present invention, the identifier reader includes an image capturing unit for acquiring a digitized image of the anti-counterfeiting mark, a main control unit for controlling each unit to perform corresponding operations, and a device for A communication unit that communicates with the background server and a display unit for displaying information.
在本发明所述的隐形点码防伪系统中, 所述隐形点码包括以设定的编码方式进行排列并在排 列后嵌入在所述背景图文中多个彩色微点。  In the invisible point code anti-counterfeiting system of the present invention, the invisible dot code includes a plurality of color micro-dots arranged in the set encoding mode and arranged in the background image after the arrangement.
在本发明所述的隐形点码防伪系统中, 所述隐形点码携带所述防伪标识的编码信息, 所述背 景图文是随机生成的并携带防伪内容, 所述载体包括纸类媒介或塑胶类媒介或金属类媒介或电脑 屏幕或手机屏幕; 所述编码信息包括一维编码或多维编码。  In the invisible point code anti-counterfeiting system of the present invention, the invisible point code carries the encoding information of the anti-counterfeiting identifier, the background graphic is randomly generated and carries anti-counterfeiting content, and the carrier comprises a paper medium or a plastic. a medium or metal medium or a computer screen or a mobile phone screen; the encoded information includes one-dimensional encoding or multi-dimensional encoding.
在本发明所述的隐形点码防伪系统中, 所述多维编码包括所述载体的编码和所述防伪标识位 置的编码; 所述多维编码由 26位十进制数字表示; 所述载体上任一点或任一区域用多维坐标来 界定。  In the invisible point code anti-counterfeiting system of the present invention, the multi-dimensional code includes an encoding of the carrier and an encoding of the location of the anti-counterfeit identifier; the multi-dimensional encoding is represented by a 26-digit decimal number; An area is defined by multidimensional coordinates.
本发明还涉及一种在数字化文件中嵌入隐形点码的方法, 包括如下步骤:  The invention also relates to a method for embedding an invisible point code in a digitized file, comprising the steps of:
A1 )将一个数字化文件转换成一个数字化的图像, 将所述数字化的图像作为防伪标识的背 景图文;  A1) converting a digitized file into a digitized image, using the digitized image as a background image of the anti-counterfeit logo;
B1 ) 按照设定的编码方式计算当前彩色微点在所述背景图文中的坐标位置;  B1) calculating a coordinate position of the current color micro-dot in the background image according to a set coding manner;
C1 ) 以所述彩色微点的位置为定点计算所述背景图文的本地颜色;  C1) calculating a local color of the background graphic by using a position of the color micro dot as a fixed point;
D1 ) 将所述本地颜色的反向颜色或黄色嵌入在所述背景图文中所述定点的位置;  D1) embedding the inverse color or yellow of the local color in the position of the fixed point in the background image;
E1 )判断所有的彩色微点是否都嵌入在所述背景图文中,如是,结束本次嵌入操作;否则, 获取下一个彩色微点并返回步骤 Bl )。  E1) determining whether all of the color micro-dots are embedded in the background image, and if so, ending the embedding operation; otherwise, acquiring the next color micro-dot and returning to step Bl).
本发明还涉及一种防伪标签的形成方法, 包括如下步骤:  The invention also relates to a method for forming an anti-counterfeit label, comprising the following steps:
A2)随机生成一个数字化文件并将其转换成一个数字化图像;  A2) randomly generating a digitized file and converting it into a digitized image;
B2 ) 将防伪标识的编码信息或所述数字化图像传送到后台服务器;  B2) transmitting the encoded information of the anti-counterfeit identification or the digitized image to a background server;
C2 ) 将所述防伪标识的隐形点码嵌入在所述数字化文件中;  C2) embedding the invisible point code of the anti-counterfeit identifier in the digitized file;
D2 ) 设定对所述防伪标识查询时所反馈的信息并将所述反馈的信息传送到后台服务器; 所述反馈的信息包括相关的鉴定结果或 /和文字或 /和图像或 /和网页或 /和短片或 /和广告;  D2) setting information fed back when the anti-counterfeiting identifier is queried and transmitting the feedback information to a background server; the feedback information includes relevant authentication results or/and text and/or images or/and web pages or / and short films or / and ads;
E2 ) 将已嵌入隐形点码的数字化文件打印在载体上;  E2) printing the digitized file embedded with the invisible dot code on the carrier;
F2 ) 从已打印的载体上任意或按照一定规则划分出多个防伪标签。  F2) Multiple security labels are assigned arbitrarily or according to certain rules from the printed carrier.
本发明还涉及一种防伪标识的解读方法, 包括如下步骤:  The invention also relates to a method for interpreting an anti-counterfeiting mark, comprising the following steps:
A3)标识解读器对防伪标识进行扫描;  A3) The identifier reader scans the anti-counterfeit logo;
B3 ) 从标识解读器的视频数据流中提取当前数字化的图像;  B3) extracting the current digitized image from the video data stream of the identification reader;
C3 ) 从所述数字化的图像中提取隐形点码, 并对其进行解码得到一个多维坐标;  C3) extracting an invisible point code from the digitized image and decoding it to obtain a multidimensional coordinate;
D3 )将解码得到的参数传送到后台服务器;所述解码得到的参数包括扫描图像、多维坐标、 查询时间、 查询地点和标识解读器身份信息;  D3) transmitting the decoded parameters to the background server; the parameters obtained by the decoding include scan image, multi-dimensional coordinates, query time, query location, and identifier reader identity information;
E3 ) 所述后台服务器对所述防伪标识作唯一性鉴定并将鉴定结果返回到所述标识解读器; 所述鉴定所需的参数包括多维坐标、 查询时间、 查询地点和标识解读器身份信息;  E3) the background server uniquely identifies the anti-counterfeiting identifier and returns an identification result to the identifier reader; the parameters required for the identification include multi-dimensional coordinates, query time, query location, and identifier reader identity information;
F3 )所述后台服务器将所述扫描图像与事先存储的背景图文进行对比并将对比结果返回到 所述标识解读器;  F3) the background server compares the scanned image with a previously stored background graphic and returns the comparison result to the identifier reader;
G3 ) 查询后台数据库, 提取与所述多维坐标相对应的第一数据, 并将所述第一数据传送回 给所述标识解读器;  G3) querying the background database, extracting first data corresponding to the multidimensional coordinates, and transmitting the first data back to the identifier reader;
H3 ) 在所述标识解读器上显示所述第一数据; 所述第一数据包括鉴定结果或 /和相关的文 字或 /和图像或 /和网页或 /和短片。  H3) displaying the first data on the identification reader; the first data comprising an identification result or/and associated text or/and image or/and webpage or/and a short film.
在本发明所述的防伪标识的解读方法中, 所述步骤 C3 ) 进一步包括:  In the method for interpreting the anti-counterfeit identifier according to the present invention, the step C3) further includes:
C31 ) 从所述数字化的图像中自动侦测出各种隐形点码的参数; 所述侦测的参数包括编码 类型、 编码维数、 大小和取向;  C31) automatically detecting parameters of various invisible point codes from the digitized image; the detected parameters include a coding type, an encoding dimension, a size, and an orientation;
C32 ) 依据所述侦测的参数对所述隐形点码进行解码得到一个多维坐标。 E31 ) 将防伪标识的编码、 标识解读器的身份、 查询时间和查询地点传送到后台服务器; E32) 依据所述防伪标识的编码、 标识解读器的身份、 查询时间和查询地点和扫描记录, 计算出唯一性的或然率; C32) Decoding the invisible point code according to the detected parameter to obtain a multi-dimensional coordinate. E31) transmitting the code of the anti-counterfeit mark, the identity of the identifier reader, the query time and the query location to the background server; E32) calculating according to the code of the anti-counterfeit mark, the identity of the identifier reader, the query time, the query place and the scan record The probability of uniqueness;
E33 ) 判断所述或然率是否大于预先设定的门限值, 如是, 将鉴定成功的信息返回到所述 标识解读器显示; 否则, 将鉴定失败的信息返回到所述标识解读器显示。  E33) determining whether the likelihood is greater than a preset threshold, and if so, returning the information of the successful identification to the identification reader display; otherwise, returning the information of the authentication failure to the identification reader display.
在本发明所述的防伪标识的解读方法中, 所述步骤 F3) 进一步包括:  In the method for interpreting the anti-counterfeit identifier according to the present invention, the step F3) further includes:
F31 ) 从所述扫描图像中提取所述防伪标识的第一背景图文;  F31) extracting, from the scanned image, a first background image of the anti-counterfeit identifier;
F32)从所述后台数据库中提取与所述防伪标识的编码相对应的防伪标识的第二背景图文, 并将所述扫描所得的第一背景图文与所述后台数据库中提取的第二背景图文进行对比, 得到一个 描述相似程度的第一数值;  F32) extracting, from the background database, a second background image of the anti-counterfeiting identifier corresponding to the encoding of the anti-counterfeiting identifier, and extracting the first background image obtained by the scanning and the second background extracted in the background database The background image is compared to obtain a first value describing the degree of similarity;
F33)判断所述第一数值是否大于设定值, 如是, 将鉴定成功的信息返回到所述标识解读器 进行显示; 否则, 将鉴定失败的信息返回到所述标识解读器进行显示。  F33) determining whether the first value is greater than a set value, and if yes, returning the information of the successful authentication to the identifier reader for display; otherwise, returning the information of the authentication failure to the identifier reader for display.
本发明还涉及一种鉴别防伪标识真假的方法, 包括如下步骤:  The invention also relates to a method for authenticating the authenticity of an anti-counterfeit mark, comprising the following steps:
A4)将标识解读器的查询参数传送到后台服务器; 所述查询参数包括防伪标识编码、 查询 时间、 查询地点和查询标识解读器的身份;  A4) transmitting the query parameter of the identifier reader to the background server; the query parameter includes the anti-counterfeiting identifier code, the query time, the query location, and the identity of the query identifier reader;
B4)后台服务器收集与所述防伪标识编码相关的查询记录;  B4) The background server collects the query record related to the anti-counterfeit identification code;
C4) 依据所述查询参数和查询记录中的数据, 计算唯一性的或然率;  C4) calculating a likelihood of uniqueness according to the query parameter and the data in the query record;
D4)判断所述或然率是否大于预先设定的门限值, 如是, 断定所述防伪标识为真; 否则, 断定所述防伪标识为假。  D4) determining whether the probability is greater than a preset threshold, and if so, determining that the anti-counterfeiting flag is true; otherwise, determining that the anti-counterfeiting flag is false.
本发明还涉及一种改变防伪标识权属的方法, 包括如下步骤:  The invention also relates to a method for changing the ownership of an anti-counterfeiting identifier, comprising the steps of:
A5) 提出防伪标识所有权变更请求;  A5) Propose a request for change of ownership of the anti-counterfeiting mark;
B5) 根据所述防伪标识的权属状态显示所有权的变更菜单;  B5) displaying a change menu of ownership according to the ownership status of the anti-counterfeiting identifier;
C5)从所述变更菜单中选择一个选项并进行所述选项的相关操作; 所述选项包括获取防伪 标识所有权或出让防伪标识所有权或放弃防伪标识所有权。  C5) selecting an option from the change menu and performing an operation related to the option; the option includes obtaining the security identity or assigning the security identity or giving up the security identity.
在本发明所述的改变防伪标识权属的方法中, 所述获取防伪标识所有权的方法包括如下步骤: A6) 显示防伪标识所有权表格, 并提示用户输入表格内容;  In the method for changing the ownership of the anti-counterfeiting identifier according to the present invention, the method for obtaining ownership of the anti-counterfeiting identifier includes the following steps: A6) displaying an anti-counterfeiting identifier ownership form, and prompting the user to input the form content;
B6) 系统依据扫描记录来判断用户是否拥有防伪标识的控制权; 如是, 执行步骤 C6); 否 则, 退出本次操作;  B6) The system determines whether the user has the control right of the anti-counterfeit mark according to the scan record; if yes, step C6); otherwise, exits the operation;
C6) 用户获得防伪标识所有权, 系统更新数据库中所有权记录。  C6) The user obtains ownership of the security mark and the system updates the ownership record in the database.
在本发明所述的改变防伪标识权属的方法中, 所述出让防伪标识所有权的方法包括如下步 骤:  In the method for changing the ownership of the anti-counterfeiting identifier according to the present invention, the method for assigning the ownership of the anti-counterfeiting identifier includes the following steps:
A7 ) 按照出让防伪标识所有权状的内容生成一个背景图文;  A7) generate a background image according to the content of the ownership of the security mark;
B7) 将出让所有权的编码加到所述出让防伪标识的编码上构成第一编码, 并将所述第一 编码嵌入到所述所有权状的背景图文中;  B7) adding a code of the transfer ownership to the code of the transfer security mark to form a first code, and embedding the first code in the background image of the ownership;
C7) 在出让方的第一标识解读器上显示所述第一编码所嵌入的所有权状;  C7) displaying the ownership embedded in the first code on the first identifier reader of the transferor;
D7) 接收方用第二标识解读器扫描所述出让方的所述第一标识解读器上的所有权状; D7) the receiver scans the ownership of the first identifier reader of the transferor with a second identifier reader;
E7) 接收方在所述第二标识解读器上确认所有权的变更; E7) the receiving party confirms the change of ownership on the second identifier reader;
F7) 系统更新数据库记录, 将防伪标识的所有权从所述出让方转给所述接收方。  F7) The system updates the database record, transferring ownership of the anti-counterfeit identification from the transferor to the recipient.
实施本发明的隐形点码防伪系统、 在数字化文件中嵌入隐形点码、 防伪标签的形成、 防伪标 识的解读、 鉴别防伪标识真假及改变防伪标识权属的方法, 具有以下有益效果:由于防伪标识的 隐形点码内容被直接嵌入在一个数字化的文件中, 文件本身的版面设计不需作任何的改动, 所以 其技术门槛高、 使用方便; 在购买商品时, 用户只需用标识解读器扫瞄一下商品上的防伪标识, 并通过网络与后台服务器进行通讯, 就能快速鉴定出商品的真伪, 所以其能即时鉴别。  The invisible dot code anti-counterfeiting system embodying the present invention, the embedded invisible dot code in the digitized file, the formation of the anti-counterfeit tag, the interpretation of the anti-counterfeit tag, the authenticity of the anti-counterfeit mark, and the method of changing the ownership of the anti-counterfeit mark have the following beneficial effects: The invisible point code content of the logo is directly embedded in a digital file. The layout of the file itself does not need to be modified, so its technical threshold is high and easy to use. When purchasing goods, users only need to use the identifier reader to scan By aiming at the anti-counterfeiting mark on the product and communicating with the back-end server through the network, the authenticity of the product can be quickly identified, so it can be instantly identified.
附图说明 DRAWINGS
图 1是本发明隐形点码防伪系统、在数字化文件中嵌入隐形点码、 防伪标签的形成方法、 防 伪标识的解读方法、 鉴别防伪标识真假的方法及改变防伪标识权属的方法实施例中隐形点码防伪 系统的结构示意图; 图 3是所述实施例中防伪标识与 26位十进制数字的一一对应关系; 1 is a stealth point code anti-counterfeiting system of the present invention, a method for embedding an invisible point code in a digitized file, a method for forming an anti-counterfeit tag, a method for interpreting an anti-counterfeit tag, a method for authenticating an authenticity of an anti-counterfeit mark, and an embodiment of a method for changing the ownership of an anti-counterfeit mark Schematic diagram of the structure of the invisible point code anti-counterfeiting system; 3 is a one-to-one correspondence between the anti-counterfeit mark and the 26-digit decimal number in the embodiment;
图 4是所述实施例中防伪标识的位置示意图;  Figure 4 is a schematic view showing the position of the anti-counterfeit mark in the embodiment;
图 5是所述实施例中防伪标识的编码多维性示意图;  Figure 5 is a schematic diagram showing the multi-dimensional coding of the anti-counterfeit identification in the embodiment;
图 6是所述实施例中防伪标识的高分辨率与可重叠性示意图;  6 is a schematic diagram of high resolution and overlapability of an anti-counterfeit mark in the embodiment;
图 7是所述实施例中标识解读器的结构示意图;  Figure 7 is a schematic structural view of the identifier interpreter in the embodiment;
图 8是所述实施例中标识解读器为手机解读器时的隐形点码防伪系统的具体结构示意图; 图 9是所述实施例中在数字化文件中嵌入隐形点码的方法的流程图;  8 is a schematic diagram showing a specific structure of an invisible point code anti-counterfeiting system when the identifier interpreter is a mobile phone interrogator in the embodiment; FIG. 9 is a flowchart of a method for embedding an invisible point code in a digitized file in the embodiment;
图 10是所述实施例中防伪标签的形成方法的流程图;  Figure 10 is a flow chart showing a method of forming an anti-counterfeit label in the embodiment;
图 11是所述实施例中防伪标识的解读方法的流程图;  11 is a flowchart of a method for interpreting an anti-counterfeit mark in the embodiment;
图 12是所述实施例中从数字化的图像中提取隐形点码, 并对其进行解码得到一个多维坐标 的具体流程图;  12 is a specific flowchart of extracting an invisible point code from a digitized image and decoding the same to obtain a multidimensional coordinate in the embodiment;
图 13是所述实施例中后台服务器对防伪标识作唯一性鉴定并将鉴定结果返回到标识解读器 的具体流程图;  13 is a specific flowchart of the background server uniquely identifying the anti-counterfeiting identifier and returning the identification result to the identifier interpreter in the embodiment;
图 14是所述实施例中后台服务器将所述扫描图像与事先存储的背景图文进行对比并将对比 结果返回到标识解读器的具体流程图;  14 is a specific flowchart of the background server comparing the scanned image with a previously stored background image and returning the comparison result to the identifier reader in the embodiment;
图 15是所述实施例中鉴别防伪标识真假的方法的流程图;  15 is a flowchart of a method for identifying authenticity of an anti-counterfeit mark in the embodiment;
图 16是所述实施例中改变防伪标识权属的方法的流程图;  Figure 16 is a flow chart showing a method of changing the security of the security feature in the embodiment;
图 17是所述实施例中获取防伪标识所有权的方法的流程图;  17 is a flowchart of a method for acquiring ownership of an anti-counterfeit mark in the embodiment;
图 18是所述实施例中出让防伪标识所有权的方法的流程图。  Figure 18 is a flow chart of a method of assigning ownership of an anti-counterfeit mark in the embodiment.
具体实施方式 detailed description
为了便于本领域的普通技术人员能够理解并实施本发明, 下面将结合附图对本发明实施例作 进一步说明。  The embodiments of the present invention will be further described with reference to the drawings in the accompanying drawings.
在本发明隐形点码防伪系统、 在数字化文件中嵌入隐形点码、 防伪标识的解读及权属管理方 法实施例中, 其隐形点码防伪系统的结构示意图如图 1所示。 图 1中, 该隐形点码防伪系统包括 防伪标识 1、 标识解读器 2和后台服务器 3。 防伪标识 1, 又称防伪标签, 或称防伪商标, 是一种 能粘贴、 印刷、 转移标的物表面或标的物包装上或标的物附属物 (如商品挂牌、 名片以及防伪证 卡) 上, 具有防伪作用的标识, 本实施例中, 防伪标识 1用于传递商品信息, 其目的是将产品的 称号, 描绘, 成分, 有效日期, 品牌信息等传达给消费者。 标识解读器 2用于通过获取防伪标识 1的数字化图像以鉴定防伪标识 1真伪, 后台服务器 3用于储存已发行的防伪标识 1的编码和相 关商品鉴定信息、 并辅助标识解读器 2对防伪标识 1进行真伪鉴定。  In the embodiment of the stealth point code anti-counterfeiting system, the embedded point code in the digitized file, the anti-counterfeit mark interpretation and the tenure management method embodiment, the structure diagram of the invisible point code anti-counterfeiting system is shown in FIG. In Fig. 1, the invisible point code anti-counterfeiting system includes an anti-counterfeiting mark 1, an identification interpreter 2, and a background server 3. Anti-counterfeit mark 1, also known as anti-counterfeit mark, or anti-counterfeit mark, is a kind of material that can be pasted, printed, transferred to the surface of the object or on the label of the object or attached to the object (such as commodity listing, business card and security card). In the present embodiment, the anti-counterfeit mark 1 is used to transmit product information, and the purpose thereof is to convey the title, depiction, composition, effective date, brand information, and the like of the product to the consumer. The identifier reader 2 is configured to obtain the authenticity of the anti-counterfeit identification 1 by acquiring the digitized image of the anti-counterfeit identification 1, and the background server 3 is configured to store the code of the issued anti-counterfeit identification 1 and related commodity identification information, and assist the identification reader 2 in anti-counterfeiting Mark 1 is authenticated.
具体来讲, 防伪标识 1是一个实体的证据, 其功用是传递商品信息同时又作为鉴定商品真伪 的依据。 该防伪标识 1的特点之一是它的唯一性, 每一枚防伪标识上的图样都是独一的, 如同人 的指纹, 没有任何两枚防伪标识具有相同的图样。 常见的仿冒方法是首先仿冒一个真品然后进行 大量复制。 本实施例中, 由于每个真品的防伪标识 1只有一个, 使造假者不能大量复制。 如果要 制造 100个假标识,就要对 100个不同的真标识分别进行仿冒。这个特点使造假成本大大地增加, 使仿冒行为在很多的应用领域得不偿失。 该防伪标识 1的另一个特点是它的方便性。 在使用时可 以将预先制造好的防伪标识 1贴在商品上以便消费者识别, 也可以直接将防伪标识 1打印在商品 上, 有利于数量大、 单价低及高速流水线上生产的商品。  Specifically, the anti-counterfeiting mark 1 is evidence of an entity, and its function is to transmit the commodity information and at the same time serve as a basis for authenticating the authenticity of the commodity. One of the characteristics of the anti-counterfeiting mark 1 is its uniqueness. The pattern on each anti-counterfeit mark is unique, like a human fingerprint, and no two anti-counterfeit marks have the same pattern. A common method of counterfeiting is to first spoof a genuine product and then make a large number of copies. In this embodiment, since there is only one anti-counterfeit mark 1 for each genuine product, the counterfeiter cannot be copied in a large amount. If you want to create 100 fake logos, you must spoof 100 different true logos. This feature greatly increases the cost of fraud, making counterfeiting behavior more worthwhile in many applications. Another feature of the anti-counterfeiting mark 1 is its convenience. When used, the pre-made anti-counterfeit mark 1 can be attached to the product for consumer identification, and the anti-counterfeit mark 1 can be directly printed on the product, which is advantageous for a large quantity, low unit price and high-speed production line.
本实施例中,标识解读器 2是一个手机应用程式,具体来讲,标识解读器 2是手机解读器(具 体是手机), 其功用是识别防伪标识 1 的真伪。 本实施例中, 标识解读器 2的特点之一是利用手 机的照相功能来获取防伪标识 1的数字化图像, 并使用手机的通讯功能与后台服务器 3作在线操 来鉴定防伪标识 1的真伪。 标识解读器 2的又一特点是它的普遍化和使用的方便性。 现代人几乎 是人手一机, 防伪标识 1的鉴别不需专业受训、 不需复杂昂贵仪器, 人人都可以轻松使用手机又 即时的鉴别商品的真伪。 在购买商品时, 用户只需用手机扫瞄一下商品上的防伪标识 1, 就能马 上鉴定出商品的真伪。 标识解读器 2的另外一个特点是鉴定假标识的能力, 即使假防伪标识与真 防伪标识是 100%的相同, 在经过标识解读器 2与后台服务器 3连线对比之后, 其也会立刻被鉴定 出来。 行的防伪标识 1的编码与相关的商品鉴定信息。现行的防伪标识 1的编码容量是十进制数字的 26 次方, 这样大的容量足以包括现在和将来许多年内所生产的每一个商品的编码需求。 后台服务器 3的另外一个功用是辅助标识解读器 2检测假防伪标识。 一般来说, 用户是不会直接接触到后台 服务器 3的, 用户通过标识解读器 2与后台服务器 3进行互动。 若发现有一个防伪标识 1是未发 行的, 既可断定是造假的。 若发现有两个防伪标识是相同的, 既可断定其中之一是仿冒, 或者两 个都是仿冒。 在仿冒出现时, 后台服务器 3可即时通知用户、 厂商与政府相关部门来稽查仿冒的 来源。 In this embodiment, the identifier reader 2 is a mobile phone application. Specifically, the identifier reader 2 is a mobile phone reader (specifically, a mobile phone), and its function is to identify the authenticity of the security identifier 1. In this embodiment, one of the features of the identifier reader 2 is to obtain a digitized image of the anti-counterfeit identifier 1 by using the camera function of the mobile phone, and use the communication function of the mobile phone and the background server 3 to perform online operations to identify the authenticity of the anti-counterfeit identifier 1. A further feature of the identification reader 2 is its generalization and ease of use. Modern people are almost a human hand. The identification of anti-counterfeiting mark 1 does not require professional training and does not require complicated and expensive instruments. Everyone can easily use the mobile phone and instantly identify the authenticity of the goods. When purchasing a product, the user simply scans the anti-counterfeiting mark 1 on the product with a mobile phone, and can immediately identify the authenticity of the product. Another feature of the identifier reader 2 is the ability to identify false identifiers. Even if the fake security identifier is 100% identical to the authentic security identifier, it will be authenticated immediately after the identifier reader 2 is compared with the background server 3. come out. The code of the anti-counterfeit mark 1 of the line and the related product identification information. The current anti-counterfeiting mark 1 has a coded capacity of 26 digits in decimal numbers, so that the large capacity is sufficient to include the coding requirements of each item produced in the present and future years. Another function of the background server 3 is to assist the identification reader 2 in detecting false security features. Generally, the user does not directly access the background server 3, and the user interacts with the background server 3 through the identifier reader 2. If it is found that an anti-counterfeiting mark 1 is unissued, it can be concluded that it is fraudulent. If it is found that two anti-counterfeiting marks are the same, it can be concluded that one of them is counterfeit, or both are counterfeit. When a counterfeit occurs, the backend server 3 can immediately notify the user, the manufacturer, and the relevant government department to check the source of the counterfeit.
图 2是本实施例中防伪标识的结构示意图。 图 2中, 防伪标识 1包括隐形点码、 背景图文 12 和载体 13; 其中, 背景图文 12设置在载体 13上, 隐形点码嵌入在背景图文 12中并通过网络将 防伪标识 1及其信息链接。 隐形点码包括多个肉眼难以看见的彩色微点 11, 上述多个彩色 11微 点以设定的编码方式进行排列并在排列后嵌入在背景图文 12 中, 最后将所生成的影像以打印、 投射或其它方式显示在载体 13上。  2 is a schematic structural view of an anti-counterfeit mark in the embodiment. In FIG. 2, the anti-counterfeiting mark 1 includes an invisible point code, a background image 12, and a carrier 13; wherein, the background image 12 is disposed on the carrier 13, the invisible dot code is embedded in the background image 12, and the anti-counterfeiting mark 1 is Its information link. The invisible dot code includes a plurality of color micro dots 11 which are hard to see by the naked eye, and the plurality of color 11 micro dots are arranged in a set encoding manner and are embedded in the background image 12 after being arranged, and finally the generated image is printed. Projected or otherwise displayed on the carrier 13.
本实施例中, 防伪标识 1中的彩色微点 11是隐形的, 由彩色微点 11组合而成的隐形点码携 带防伪标识 1的编码信息。 防伪标识 1的背景图文 12是随机生成的并携带防伪内容, 此外, 背 景图文 12是显形的, 只携带防伪内容, 不携带编码信息。 防伪标识 1的载体 13是显形的, 载体 13包括纸类媒介或塑胶类媒介或金属类媒介或电脑屏幕或手机屏幕。本实施例中的防伪标识 1有 静态标识与动态标识两种。 静态标识是指防伪标识内容一次性的成像在载体 13 上之后就永久不 变了。 静态标识的成像方法包括有: 1 ) 使用打印机将防伪标识内容打印在载体 13 上。 2 ) 使用 各种雕刻机将防伪标识内容雕刻在载体 13 上。 一般来讲, 静态标识的成像的工艺是依照载体和 使用方法而定的。 静态标识的特点是载体上的内容是静态的, 是不变的。 动态标识主要是指将防 伪标识内容成像在电视、 电脑或手机的屏幕上。 动态标识的特点是载体上的内容是动态的, 是会 改变的。  In this embodiment, the color micro-dot 11 in the anti-counterfeit mark 1 is invisible, and the invisible dot code combined by the color micro-dot 11 carries the encoded information of the anti-counterfeit mark 1. The background image 12 of the anti-counterfeiting mark 1 is randomly generated and carries the anti-counterfeit content. In addition, the background image 12 is explicit, carrying only the anti-counterfeit content, and does not carry the encoded information. The carrier 13 of the security feature 1 is phenotype, and the carrier 13 includes a paper medium or a plastic medium or a metal medium or a computer screen or a mobile phone screen. The anti-counterfeiting identifier 1 in this embodiment has two types: a static identifier and a dynamic identifier. The static identification means that the one-time imaging of the anti-counterfeit identification content is permanently unchanged after being imaged on the carrier 13. The imaging methods for static identification include: 1) Printing the anti-counterfeit identification content on the carrier 13 using a printer. 2) The contents of the security mark are engraved on the carrier 13 using various engraving machines. In general, the process of statically labeled imaging is based on the carrier and method of use. The characteristic of static identification is that the content on the carrier is static and unchanged. Dynamic identification mainly refers to imaging the content of the anti-counterfeit logo on the screen of a TV, computer or mobile phone. The feature of dynamic identification is that the content on the carrier is dynamic and will change.
本实施例中, 上述编码信息包括一维编码或多维编码, 具体来讲, 防伪标识 1中的编码信息 可以是一维的, 也可以是多维的。 简单来说, 一维编码是指在一个防伪标识 1 中只有一个号码, 也只能有一个链接热点,完成一项任务。多维编码是指在一个防伪标识中有一个多维空间的区域, 在这个区域内可以包含有多个链接热点, 也就是在一个防伪标识中可以有多个号码, 也可以有多 个链接热点, 可以完成多项任务 。 本实施例中, 防伪标识 1的编码为多维编码。  In this embodiment, the coding information includes one-dimensional coding or multi-dimensional coding. Specifically, the coding information in the anti-counterfeit identifier 1 may be one-dimensional or multi-dimensional. To put it simply, one-dimensional coding means that there is only one number in an anti-counterfeiting sign 1, and there can only be one link hotspot to complete a task. Multi-dimensional coding refers to an area with a multi-dimensional space in an anti-counterfeiting mark. In this area, there may be multiple link hotspots, that is, there may be multiple numbers in one anti-counterfeit mark, or multiple link hotspots. Complete multiple tasks. In this embodiment, the code of the anti-counterfeit mark 1 is multi-dimensional code.
一般的条码或二维码在视觉上是非常明显的, 很容易用普通的复印机或其它简单的方法来仿 冒。 而隐形点码在视觉上是隐秘的, 隐形点码的生成是用肉眼难以看见的彩色微点 11 以近似随 机组合的方式进行排列, 之后再嵌入到背景文字或图像中。 因为视觉上的隐秘性, 所以用普通的 复印机或一些简单的方法是不能复制隐形点码的。 除了视觉上的隐秘性之外, 隐形点码的编码方 法和编码内容也是隐秘的, 隐形点码中的彩色微点 11 所放置的位置是近乎随机的, 如果不知道 编码方法是无法制造假码的。  A general bar code or two-dimensional code is visually very obvious, and it is easy to copy it with a normal copying machine or other simple method. The invisible dot code is visually secret. The invisible dot code is generated by color micro dots 11 which are hard to see with the naked eye, and are arranged in a similar random combination, and then embedded in the background text or image. Because of the visual concealment, it is impossible to copy invisible dot codes with ordinary copiers or some simple methods. In addition to visual concealment, the encoding method and encoding content of the invisible dot code are also secret. The position of the color micro-dot 11 in the invisible dot code is nearly random. If you do not know the encoding method, you cannot make a fake code. of.
在每一枚点码标识上, 彩色微点 11的排列都是独一的, 如同人的指纹。 没有任何两个指纹 是一样的, 也没有任何两个防伪标识的彩色微点 11的排列是相同的; 也就是说:一个防伪标识, 一个排列, 没有重复的。 值得注意的是, 确保每个排列都是独一的方法有很多, 其中之一是给每 一枚防伪标识 1一个独立的号码,本实施例中,防伪标识 1的编码用一个 26位十进制号码表示, 即多维编码由 26位十进制数字表示, 按照这个 26位十进制号码进行有序的排列就可确保防伪标 识 1 的唯一性。 图 3 是本实施例中防伪标识与 26 位十进制数字的一一对应关系。 图 3 中, " 54321098765432109876543210"为一个 26位十进制数字。  On each dot code identifier, the arrangement of the color micro dots 11 is unique, like a human fingerprint. No two fingerprints are the same, and the arrangement of the color micro-points 11 without any two anti-counterfeit labels is the same; that is, one anti-counterfeiting mark, one arrangement, and no repetition. It is worth noting that there are many ways to ensure that each permutation is unique. One of them is to give each anti-counterfeit identification 1 a separate number. In this embodiment, the anti-counterfeiting identification 1 is encoded with a 26-digit decimal number. The multi-dimensional code is represented by a 26-digit decimal number. The orderly arrangement of the 26-digit decimal number ensures the uniqueness of the anti-counterfeit mark 1. Figure 3 is a one-to-one correspondence between the anti-counterfeit mark and the 26-digit decimal number in this embodiment. In Figure 3, "54321098765432109876543210" is a 26-digit decimal number.
常见的仿冒方法是模仿与复制, 首先模仿一个真品, 然后加以大量的复制。 防伪标识 1 的 唯一性使常见的仿冒方法完全失灵, 因为同一号码, 同一外观的真品防伪标识只有一个。 当市场 上出现多个号码相同的防伪标识 1时, 系统会发出警告, 并且在后台服务器 3中自动将被仿冒的 防伪标识号码作废掉。 这样的防伪机制使仿冒行为得不偿失。  The common method of counterfeiting is imitation and copying. First, imitate a real thing, and then copy it in large quantities. The uniqueness of the anti-counterfeiting label 1 makes the common counterfeiting method completely unsuccessful, because there is only one authenticity anti-counterfeiting identifier for the same appearance. When multiple anti-counterfeit identifiers 1 with the same number appear on the market, the system will issue a warning and automatically abolish the counterfeit security identification number in the background server 3. Such anti-counterfeiting mechanisms make counterfeiting more than worth the loss.
图 4是本实施例中防伪标识的位置示意图。 本实施例中, 防伪标识 1是具有随机性的标识。 因为防伪标识 1所在的位置与其大小定义了防伪标识 1上彩色微点 11的排列,又因为防伪标识 1 的位置与大小在一定程度上具有随机性, 所以防伪标识 1上的彩色微点 11在一定程度上也具有 大大地提升了防伪标识 1的防伪功能, 因为完全随机性的事件是无法预测的, 使得造假者不能预 测防伪标识 1的背景图文 12, 也不能冒名制造出可以乱真的假标识。 4 is a schematic view showing the position of the anti-counterfeit mark in the embodiment. In this embodiment, the anti-counterfeit mark 1 is an identifier having randomness. Because the location of the anti-counterfeit mark 1 and its size define the arrangement of the color micro-dot 11 on the anti-counterfeit mark 1, and because the position and size of the anti-counterfeit mark 1 are random to some extent, the color micro-dot 11 on the anti-counterfeit mark 1 is To some extent also The anti-counterfeiting function of the anti-counterfeit mark 1 is greatly improved, because the completely random event is unpredictable, so that the counterfeiter cannot predict the background image 12 of the anti-counterfeit mark 1, nor can it create a false mark that can be confusing.
图 5是本实施例中防伪标识的编码多维性示意图; 本实施例中的防伪标识 1的编码是多维性 的, 其中包括载体 13的编码与防伪标识 1位置的编码。 一个完整的防伪标识 1的编码是由 26位 十进制的数字所组成。 这样大的容量可以满足现在和将来许多年内所生产的所有商品的编码需 要。有关标识的编码方法请参考中国专利: ZL03145092,与美国专利: 6256398, 6577748, 6819776, 7123742 ο  FIG. 5 is a schematic diagram of the multi-dimensional coding of the anti-counterfeit identifier in the embodiment. The encoding of the anti-counterfeit identifier 1 in this embodiment is multi-dimensional, and includes the encoding of the carrier 13 and the encoding of the anti-counterfeiting identifier 1 position. A complete anti-counterfeit identification 1 code consists of 26 decimal digits. This large capacity can meet the coding needs of all goods produced in the current and future years. For the coding method of the identification, please refer to the Chinese patent: ZL03145092, and the US patent: 6256398, 6577748, 6819776, 7123742.
编码的多维性使载体 13 上的任何一点或任何一小块区域都可以用多维坐标来界定, 并可以 将界定之后的区域定义为链接热点。 当手机扫描所得的坐标 (Χ,Υ,Ζ) 落在某一界定的区域之内 时, 就可启动相应的链接热点, 在手机上显示链接信息。 例如: (Χ,Υ,Ζ)是描述载体 (Ζ) 中的一 个点 (Χ,Υ)。 又例如: (R,X,Y,Z) 是描述载体 (Z) 中的一个以 (X,Y) 为圆心, 以(R) 为半径的 圆。 参照上图,热点 1是用 (R1,X1,Y1,Z1 ) 来界定的圆, 热点 2是用 (R2,X2,Y2,Z1 ) 来界定的 圆。 当手机扫描所得的坐标 (X,Y,Z) 落在热点 1范围内时, 热点 1被启动, 在手机上显示出热 点 1的链接信息。 当手机扫描所得的坐标 (Χ,Υ,Ζ) 落在热点 2的范围内时, 热点 2被启动, 在 手机上显示出热点 2的链接信息。如果 (Χ, Υ, Ζ) 没有落在任何标识范围内,没有链接热点被启动, 也不会显示任何链接信息。  The multidimensionality of the code allows any point or any small area on the carrier 13 to be defined by multidimensional coordinates, and the defined area can be defined as a link hotspot. When the coordinates (Χ, Υ, Ζ) scanned by the mobile phone fall within a certain defined area, the corresponding link hotspot can be activated to display the link information on the mobile phone. For example: (Χ, Υ, Ζ) is a point (Χ, Υ) in the description carrier (Ζ). For another example: (R, X, Y, Z) is a circle describing the carrier (Z) with (X, Y) as the center and (R) as the radius. Referring to the above figure, hot spot 1 is a circle defined by (R1, X1, Y1, Z1), and hot spot 2 is a circle defined by (R2, X2, Y2, Z1). When the coordinates (X, Y, Z) scanned by the mobile phone fall within the range of the hot spot 1, the hot spot 1 is activated, and the link information of the hot spot 1 is displayed on the mobile phone. When the coordinates (Χ, Υ, Ζ) scanned by the mobile phone fall within the range of the hotspot 2, the hotspot 2 is activated, and the link information of the hotspot 2 is displayed on the mobile phone. If (Χ, Υ, Ζ) does not fall within any of the logos, no link hotspots are activated and no link information is displayed.
图 6是本实施例中防伪标识的高分辨率与可重叠性示意图。图 6中,热点 1是用(Rl, XI, Yl, Z) 来界定的圆, 热点 2是用 (R2,X2,Y2,Z) 来界定的圆。 热点 1与热点 2所界定的区域有相互重叠 的地方。 当手机扫描所得的坐标 (X, Υ, Z) 同时落在热点 1与热点 2之内时, 由于其距离热点 2 的圆心比较近, 所以启动热点 2的链接热点, 并显示热点 2链接的内容。 由此可以看出, 热点间 的分辨度是由多维坐标的解析度来定义的。 因为多维坐标的解析度通常都在一毫米以下, 所以热 点间的分辨率是很高的。  Fig. 6 is a schematic diagram showing the high resolution and overlapability of the anti-counterfeit mark in the embodiment. In Fig. 6, hot spot 1 is a circle defined by (Rl, XI, Yl, Z), and hot spot 2 is a circle defined by (R2, X2, Y2, Z). The areas defined by Hotspot 1 and Hotspot 2 overlap each other. When the coordinates (X, Υ, Z) scanned by the mobile phone fall within the hotspot 1 and the hotspot 2 at the same time, since the center of the hotspot 2 is relatively close, the hotspot of the hotspot 2 is activated, and the content of the hotspot 2 is displayed. . It can be seen that the resolution between hotspots is defined by the resolution of multidimensional coordinates. Since the resolution of multidimensional coordinates is usually less than one millimeter, the resolution between hot spots is very high.
图 7是本实施例中标识解读器的结构示意图;本实施例中的标识解读器 2包括有硬体与软体, 硬体是一个手机, 软体是手机上的一个应用程式。 具体来讲, 标识解读器 2包括摄像单元 21、 主 控单元 22、通讯单元 23和显示单元 24; 其中,摄像单元 21用于获取防伪标识 1的数字化图像, 主控单元用于控制各单元(通讯单元 23和显示单元 24)进行相应操作, 通讯单元 23用于与后台 服务器 3进行通讯, 显示单元 24用于显示信息。 摄像单元 21包括手机上的摄像传感器和控制软 体。 通讯单元 23包括与上网相关的硬体和软体。 主控单元 22与显示单元 24是一般手机中常见 的。  FIG. 7 is a schematic structural diagram of the identifier interpreter in the embodiment; the identifier interpreter 2 in the embodiment includes a hardware and a software, the hardware is a mobile phone, and the software is an application on the mobile phone. Specifically, the identifier reader 2 includes an image capturing unit 21, a main control unit 22, a communication unit 23, and a display unit 24; wherein the camera unit 21 is configured to acquire a digitized image of the anti-counterfeit label 1, and the main control unit is configured to control each unit ( The communication unit 23 and the display unit 24) perform corresponding operations, the communication unit 23 is used for communication with the background server 3, and the display unit 24 is for displaying information. The camera unit 21 includes an image sensor and a control software on the mobile phone. The communication unit 23 includes hardware and software related to the Internet. The main control unit 22 and the display unit 24 are common in general mobile phones.
本实施例中, 标识解读器 2拥有多重功用: 第一个功用是鉴定防伪标识的真伪, 第二个功用 是提供与防伪标识相关的产品信息, 第三个功用是对防伪标识身份与所属权的管理。 值得注意的 是, 防伪标识真伪的鉴定实际上是一种对标识身份的认证。  In this embodiment, the identifier reader 2 has multiple functions: the first function is to verify the authenticity of the anti-counterfeit label, the second function is to provide product information related to the anti-counterfeiting label, and the third function is to identify and belong to the anti-counterfeit identification. Management of rights. It is worth noting that the identification of the authenticity of the anti-counterfeiting mark is actually an authentication of the identity.
图 8是本实施例中标识解读器为手机解读器时的隐形点码防伪系统的具体结构示意图; 标识 解读器 2 中的手机应用程式在设计和使用上有以下几个特点: 1 ) 将摄像传感器设置在连续视频 状态, 使识别器 (标识解读器) 可自动从视频数据流中提取最新的数字化的图像, 无需用户的干 预。 2 ) 使用手机的通讯功能与后台服务器 3作在线操作, 联合鉴定标识的身份。 3 ) 使用 "一对 多" 的相应关系, 将防伪标识与标识物的各样信息关联起来。 4) 使用多频道设计架构, 将各种 与防伪标识相关的信息从后台服务器 3送到手机上显示。 5 ) 用户只需要作一个动作, 就是对准 防伪标识, 不需要按其它任何键, 就可完成防伪标识的认证。 6 ) 在完成防伪标识认证的同时, 又提供防伪标识管理功能, 而且还提供与防伪标识相关的产品内容与广告内容。 7 ) 用户只需按 一个键就可在各个频道 (扫描频道、 标识频道、 信息频道和广告频道) 之间作切换。  8 is a schematic diagram of a specific structure of an invisible point code anti-counterfeiting system when the identifier is a mobile phone reader in the embodiment; the mobile phone application in the identifier reader 2 has the following features in design and use: 1) The sensor is set in a continuous video state, allowing the recognizer (identification reader) to automatically extract the latest digitized image from the video data stream without user intervention. 2) Use the communication function of the mobile phone and the background server 3 to perform online operation, and jointly identify the identity of the identity. 3) Use the "one-to-many" relationship to associate the anti-counterfeiting mark with the various information of the mark. 4) Using the multi-channel design architecture, various information related to the anti-counterfeiting identification is sent from the background server 3 to the mobile phone for display. 5) The user only needs to make one action, that is, align the anti-counterfeiting mark, and the authentication of the anti-counterfeit mark can be completed without pressing any other keys. 6) While providing anti-counterfeiting identification, it also provides anti-counterfeiting identification management functions, and also provides product content and advertising content related to anti-counterfeiting identification. 7) The user can switch between channels (scan channel, logo channel, information channel and advertising channel) with the press of a button.
本实施例还涉及一种在数字化文件中嵌入隐形点码的方法, 其流程图如图 9所示。 图 9中, 该在数字化文件中嵌入隐形点码的方法包括:  The embodiment further relates to a method for embedding an invisible point code in a digitized file, the flow chart of which is shown in FIG. In Figure 9, the method for embedding the invisible point code in the digitized file includes:
步骤 S11 将一个数字化的文件转换成一个数字化的图像, 将数字化的图像作为防伪标识 的背景图文: 本步骤中, 首先将一个数字化的文件转换成一个数字化的图像, 然后将该数字化的 图像作为防伪标识的背景图文。  Step S11 converts a digitized file into a digitized image and uses the digitized image as a background image of the anti-counterfeit logo: In this step, first convert a digitized file into a digitized image, and then use the digitized image as a digital image. Background image of the anti-counterfeiting logo.
步骤 S12 按照设定的编码方式计算当前彩色微点在背景图文中的坐标位置: 本步骤中, 按 步骤 S13以彩色微点的位置为定点计算背景图文的本地颜色: 本步骤中, 以彩色微点的坐 标位置 (X, Y)为定点计算背景图文的本地颜色。 Step S12 calculates the coordinate position of the current color micro-dot in the background image according to the set encoding mode: In this step, press Step S13 calculates the local color of the background image by using the position of the color micro-point as a fixed point: In this step, the local color of the background graphic is calculated by using the coordinate position (X, Y) of the color micro-point as a fixed point.
步骤 S14 将本地颜色的反向颜色或黄色嵌入在背景图文中定点的位置: 本步骤中, 将本地 颜色的反向颜色或黄色嵌入在背景图文中的定点位置 (X, Y)。  Step S14 Embed the reverse color or yellow color of the local color in the position of the fixed point in the background image: In this step, the reverse color or yellow color of the local color is embedded in the fixed point position (X, Y) in the background image.
步骤 S15 判断所有的彩色微点是否都嵌入在背景图文中: 本步骤中, 判断所有的彩色微点 是否都嵌入在背景图文中, 如果判断的结果为是, 则执行步骤 S16; 否则, 执行步骤 S17。  Step S15: determining whether all the color micro-dots are embedded in the background image: In this step, determining whether all the color micro-dots are embedded in the background graphic, and if the result of the determination is yes, executing step S16; otherwise, Step S17 is performed.
步骤 S16 结束本次嵌入操作: 如果上述步骤 S15的判断结果为是, 则执行本步骤, 本步骤 中, 结束本次嵌入操作。  Step S16 Ends the embedding operation: If the result of the above step S15 is YES, the step is executed. In this step, the embedding operation is ended.
步骤 S17 获取下一个彩色微点: 如果上述步骤 S15的判断结果为否, 则执行本步骤。 值得 一提的是, 执行完本步骤, 返回步骤 S12, 直到将所有的彩色微点都嵌入在背景图文中为止。  Step S17: Acquire the next color micro dot: If the result of the above step S15 is no, the present step is executed. It is worth mentioning that after performing this step, the process returns to step S12 until all the color micro dots are embedded in the background image.
上述步骤 S12与 S13中有关的计算方法请参考中国专利: ZL03145092,与美国专利: 6256398, 6577748, 6819776, 7123742。 在本实施例中, 防伪标识的隐形编码内容可被直接嵌入在一个数 字化的文件中, 文件本身的版面设计不需作任何的改动。 这样的方法即提供了使用上的方便, 又 提高了仿冒难度, 同时也不破坏原始文件的美感。  For the calculation methods related to the above steps S12 and S13, please refer to the Chinese patent: ZL03145092, and the US patents: 6256398, 6577748, 6819776, 7123742. In this embodiment, the invisible coded content of the anti-counterfeit mark can be directly embedded in a digitized file, and the layout of the file itself does not need to be modified. This method provides convenience in use, improves the difficulty of counterfeiting, and does not destroy the aesthetics of the original document.
本实施例还涉及一种防伪标签的形成方法, 其流程图如图 10所示。 图 10中, 该防伪标签的 形成方法包括:  This embodiment further relates to a method for forming an anti-counterfeit label, and a flowchart thereof is shown in FIG. In Figure 10, the method for forming the security label includes:
步骤 S21 随机生成一个数字化文件并将其转换成一个数字化图像: 本步骤中, 随机生成一个 数字化文件, 并将该数字化文件转换成一个数字化图像。  Step S21 randomly generates a digitized file and converts it into a digitized image: In this step, a digitized file is randomly generated, and the digitized file is converted into a digitized image.
步骤 S22 将防伪标识的编码信息或数字化图像传送到后台服务器: 本步骤中, 将防伪标识的 编码或上述数字化图像 (上述数字化文件的图像) 传送到后台服务器中, 以便在鉴别时将防伪标 识的背景图文与后台服务器中对应的背景图文进行比对。  Step S22: transmitting the encoded information or the digitized image of the anti-counterfeit identifier to the background server: In this step, the code of the anti-counterfeit identifier or the digitized image (the image of the digitized file) is transmitted to the background server, so that the anti-counterfeit identifier is The background image is compared with the corresponding background image in the background server.
步骤 S23 将防伪标识的隐形点码嵌入在数字化文件中: 本步骤中, 将防伪标识(其编码为多 维编码) 的隐形点码嵌入在数字化文件中, 其嵌入方法参见上述图 9。  Step S23 embed the invisible point code of the anti-counterfeiting identifier in the digitized file: In this step, the invisible point code of the anti-counterfeiting identifier (which is encoded into multi-dimensional encoding) is embedded in the digitized file, and the embedding method is shown in FIG. 9 above.
步骤 S24设定对防伪标识查询时所反馈的信息并将反馈的信息传送到后台服务器:本步骤中, 定义查询防伪标识时标识解读器整个页面反馈的信息 (回应的信息), 并将定义的内容和相关数 据传送到后台服务器中; 上述反馈的信息包括相关的鉴定结果或 /和文字或 /和图像或 /和网页或 / 和短片或 /和广告等信息。  Step S24: setting the information fed back when the anti-counterfeiting identifier is queried and transmitting the feedback information to the background server: in this step, when the anti-counterfeiting identifier is queried, the information (response information) of the entire page of the interpreter is identified, and the definition is The content and related data are transmitted to the backend server; the feedback information includes relevant authentication results or/and text and/or images or/and web pages and/or video or/and advertisements.
步骤 S25 将已嵌入隐形点码的数字化文件打印在载体上: 本步骤中, 将已嵌入隐形点码的数 字化文件打印在载体 (标签载体) 上。  Step S25 Prints the digitized file embedded with the invisible dot code on the carrier: In this step, the digitized file in which the invisible dot code is embedded is printed on the carrier (tag carrier).
步骤 S26 从已打印的载体上任意或按照一定规则划分出多个防伪标签: 本步骤中, 从已打印 的载体上任意或是按照某一特定的方法划分出(切出)多个防伪标签来, 其可被贴在商品上作为防 伪标签用。  Step S26: Arranging a plurality of anti-counterfeit labels from the printed carrier arbitrarily or according to a certain rule: In this step, a plurality of anti-counterfeit labels are divided (cut out) from the printed carrier arbitrarily or according to a specific method. , it can be attached to the product as an anti-counterfeit label.
在上述防伪标签的形成方法中, 因为数字化文件是随机生成的, 所以能够保证每一个防伪标 签的随机性。 又因为使用隐形的彩色微点和多维编码, 所以能够确保每一个防伪标签的隐秘性和 唯一性。 此外, 因为所有的防伪标签都在同一个载体上, 在查询时都有同样的回应, 所以不需要 对每一个防伪标签作特殊的区域界定, 并且可以任意地从载体上切出许多防伪标签来用。 这样的 形成方法可以大大地方便使用者。 另外, 值得特别注意的是, 此方法不仅仅是一种防伪标签的形 成方法, 也是一种在产品上或防伪标识上或商标上或包装上浏览网上或厂商所提供的相关信息的 方法。  In the above method of forming the security label, since the digitized files are randomly generated, the randomness of each of the security labels can be ensured. And because of the use of invisible color micro-dots and multi-dimensional encoding, it is possible to ensure the privacy and uniqueness of each security label. In addition, since all the security labels are on the same carrier and have the same response when querying, there is no need to define a special area for each security label, and many security labels can be arbitrarily cut out from the carrier. use. Such a method of formation can greatly facilitate the user. In addition, it is worth noting that this method is not only a method of forming an anti-counterfeit label, but also a method of browsing related information provided by the manufacturer or the manufacturer on the product or on the anti-counterfeit label or on the trademark or on the package.
本实施例还涉及一种防伪标识的解读方法, 其流程图如图 11所示。 图 11中, 该解读方法利 用手机内建的摄像传感器获取防伪标识的数字化图像, 并利用手机内建电脑来解码嵌入在图像中 的编码。该方法又利用手机内建的通讯功能、定时、定位功能将扫描时手机的位置、手机的身份、 扫描的时间和扫描图像等等传送到后台服务器。 该解读方法又与后台服务器在线运作, 综合鉴定 标识的真伪, 并将鉴定结果显示在手机屏幕上。 该解读方法包括:  This embodiment further relates to a method for interpreting an anti-counterfeit mark, and a flowchart thereof is shown in FIG. In Fig. 11, the interpretation method uses the built-in camera sensor of the mobile phone to obtain a digitized image of the anti-counterfeit logo, and uses the built-in computer of the mobile phone to decode the code embedded in the image. The method further utilizes the built-in communication function, timing and positioning function of the mobile phone to transmit the location of the mobile phone, the identity of the mobile phone, the scanning time and the scanned image, etc. to the background server during scanning. The interpretation method is operated online with the background server to comprehensively identify the authenticity of the logo and display the identification result on the screen of the mobile phone. The interpretation method includes:
步骤 S31标识解读器对防伪标识进行扫描: 本步骤中, 标识解读器对防伪标识进行扫描。 具 体就是利用标识解读器的照相 (摄像) 功能对防伪标识进行扫描。  Step S31 identifies the interpreter scanning the anti-counterfeiting identifier: In this step, the identifier interpreter scans the anti-counterfeiting identifier. Specifically, the anti-counterfeit logo is scanned using the camera (camera) function of the logo reader.
步骤 S32 从标识解读器的视频数据流中提取当前数字化的图像: 本步骤中, 具体就是从手机 步骤 S33 从数字化的图像中提取隐形点码, 并对其进行解码得到一个多维坐标: 本步骤中, 从数字化的图像中提取隐形点码, 并对其解码得到一个多维坐标 (X,Y), 其中 (Χ,Υ) 是隐形点 码在载体上的位置, (Υ) 是载体的编码。 Step S32: extracting the current digitized image from the video data stream of the identifier reader: In this step, specifically from the mobile phone Step S33 extracts the invisible point code from the digitized image, and decodes it to obtain a multi-dimensional coordinate: In this step, the invisible point code is extracted from the digitized image, and is decoded to obtain a multi-dimensional coordinate (X, Y). Where (Χ,Υ) is the position of the invisible point code on the carrier, (Υ) is the encoding of the carrier.
步骤 S34 将解码得到的参数传送到后台服务器: 本步骤中, 将解码得到的参数传送到后台服 务器 (后台系统), 解码得到的参数包括扫描图像、 多维坐标、 查询时间、 查询地点和标识解读 器身份信息。  Step S34: The decoded parameter is transmitted to the background server: In this step, the decoded parameter is transmitted to the background server (background system), and the decoded parameters include scan image, multidimensional coordinates, query time, query location, and identifier reader. Identity Information.
步骤 S35 :后台服务器对防伪标识作唯一性鉴定并将鉴定结果返回到标识解读器:本步骤中, 使用后台服务器 (后台系统)对标识作唯一性鉴定。 鉴定所需的参数包括多维坐标、 查询时间、 查 询地点和标识解读器身份信息; 如果鉴定失败则将结果传回标识解读器 (具体是手机), 并在标识 解读器 (具体是手机)上显示相关的失败信息。  Step S35: The background server uniquely identifies the anti-counterfeiting identifier and returns the authentication result to the identifier interpreter: in this step, the background server (background system) is used to uniquely identify the identifier. The parameters required for identification include multidimensional coordinates, query time, query location and identification reader identity information; if the authentication fails, the result is transmitted back to the identification reader (specifically the mobile phone) and displayed on the identification reader (specifically the mobile phone) Related failure information.
步骤 S36 后台服务器将扫描图像与事先存储的背景图文进行对比并将对比结果返回到标识 解读器:本步骤中,使用后台服务器 (后台系统)对扫描图像与事先存储的标识背景图文进行比对。 如果比对失败则将结果传回手机, 并在手机上显示相关的失败信息。  Step S36: The background server compares the scanned image with the background image stored in advance and returns the comparison result to the identifier reader: in this step, the background server (background system) is used to compare the scanned image with the previously stored logo background image. Correct. If the comparison fails, the result is sent back to the phone and the relevant failure message is displayed on the phone.
步骤 S37 查询后台数据库, 提取与坐标相对应的第一数据, 并将第一数据传送回给标识解读 器: 本步骤中, 查询后台数据库, 提取与多维坐标相对应的第一数据, 并将第一数据传送回给手 机。  Step S37: querying the background database, extracting the first data corresponding to the coordinates, and transmitting the first data back to the identifier reader: In this step, querying the background database, extracting the first data corresponding to the multidimensional coordinates, and A data is sent back to the phone.
步骤 S38 在标识解读器上显示所述第一数据: 本步骤中, 在手机上显示与解码坐标(多维坐 标)所对应的第一数据, 该第一数据包括鉴定结果或 /和相关的文字或 /和图像或 /和网页或 /和短 片。  Step S38: displaying the first data on the identifier reader: In this step, displaying first data corresponding to the decoded coordinates (multidimensional coordinates) on the mobile phone, the first data including the identification result or/and the related text or / and images or / and web pages / / and short films.
本实施例中, 防伪标识拥有隐秘性、 唯一性和随机性三大防伪特征。 这三大特征是对防伪标 识的三层防伪保护。 隐秘性包括防伪标识内容是肉眼几乎看不见的, 防伪标识编码是不公开的, 其保护防伪标识的外观与编码内容。 唯一性是指防伪标识的视觉影像是独一的, 如同人的指纹, 没有任何两个防伪标识是相同的, 其保护防伪标识不能被大量复制。 随机性是指部分防伪标识内 容是随机的, 是不可预测的, 其保护防伪标识不能被冒名假造。 本实施例中的上述解读方法综合 了这三大特征, 使防伪标识的防伪功能呈指数级的增长。 如果用钥匙开门来作一个比喻, 防伪标 识的综合鉴定需用三把钥匙先后开启三个门。 第一把钥匙是编码方法, 第一个门是防伪标识中的 彩色微点。 只有知道正确的编码方法才能成功地解码标识中的彩色微点, 从而得到第二把钥匙。 第二把钥匙是一个多维坐标, 第二个门是防伪标识唯一性的鉴定。 多维坐标与防伪标识的相互对 应关系是预先定义好的。 一般来讲, 根据统计数据, 如查询时间、 地点、 次数及查询时所用的手 机等等, 可以很准确地判断出一个被查询的号码 (本实施例中为防伪标识的 26 位十进制数字) 是否是唯一的。 在后台服务器中存有每个防伪标识的号码和查询统计数据, 只有当查询号码是有 效的、 已经发行的, 而且是唯一的条件下, 才能从后台服务器中提第三把钥匙。 第三把钥匙是防 伪标识的背景图文, 第三个门是将提取的背景图文与被鉴定标识的背景图文的相互比对。 只有当 所提取的背景图文与被鉴定标识的背景图文相匹配时, 第三个门才能被打开。  In this embodiment, the anti-counterfeiting identifier has three security features: privacy, uniqueness, and randomness. These three characteristics are three layers of anti-counterfeiting protection for anti-counterfeiting. Concealment includes the content of the anti-counterfeit mark is almost invisible to the naked eye, and the anti-counterfeit mark code is not disclosed, which protects the appearance and coded content of the anti-counterfeit mark. Uniqueness means that the visual image of the anti-counterfeit logo is unique. Just like a human fingerprint, no two anti-counterfeit logos are the same, and the protection anti-counterfeit logo cannot be copied in large quantities. Randomness means that the content of some anti-counterfeiting labels is random and unpredictable, and its protection of anti-counterfeiting labels cannot be impersonated. The above-mentioned interpretation method in this embodiment combines these three characteristics, so that the anti-counterfeiting function of the anti-counterfeiting mark is exponentially increased. If a key is used to open the door for a metaphor, the comprehensive identification of the anti-counterfeiting mark requires three keys to open three doors. The first key is the encoding method, and the first door is the colored micro dot in the anti-counterfeiting mark. Only knowing the correct encoding method can successfully decode the color micro dots in the logo, thus obtaining the second key. The second key is a multi-dimensional coordinate, and the second door is the identification of the uniqueness of the anti-counterfeiting mark. The mutual correspondence between the multidimensional coordinates and the anti-counterfeiting mark is predefined. Generally speaking, according to statistical data, such as query time, location, number of times, and the mobile phone used for the inquiry, etc., it is possible to accurately determine whether a number to be queried (26-digit decimal number of the anti-counterfeit mark in this embodiment) only one. The number and query statistics of each anti-counterfeit identifier are stored in the background server. Only when the query number is valid, has been issued, and is the only condition, the third key can be extracted from the background server. The third key is the background image of the anti-counterfeit logo, and the third door is the comparison of the extracted background image with the background image of the identified logo. The third door can only be opened when the extracted background image matches the background image of the identified logo.
本实施例中, 上述步骤 S33可进一步进行细化, 其具体流程图如图 12所示。 图 12中, 上述 步骤 S33进一步包括:  In this embodiment, the above step S33 can be further refined, and a specific flowchart thereof is shown in FIG. In Figure 12, the above step S33 further includes:
步骤 S331 从数字化的图像中自动侦测出各种隐形点码的参数: 本步骤中, 从数字化的图像 中自动侦测出各种隐形点码的参数, 侦测的参数包括编码类型、 编码维数、 大小和取向等等。 数 字化的图像是利用手机的照相功能得到的。  Step S331 automatically detects various parameters of the invisible point code from the digitized image: In this step, parameters of various invisible point codes are automatically detected from the digitized image, and the detected parameters include the coding type and the coding dimension. Number, size and orientation, etc. The digitized image is obtained using the camera function of the mobile phone.
步骤 S332 依据侦测的参数对隐形点码进行解码得到一个多维坐标: 本步骤中, 依据侦测的 参数对隐形点码进行解码得到一个多维坐标, 例如: (Χ,Υ,Ζ. . )。 多维坐标的维数是依照自动侦 测出的隐形点码的参数而定的。其详细内容可参考中国专利: ZL03145092 ,与美国专利: 6256398, 6577748, 6819776, 7123742。 该解码操作利用手机的计算功能。  Step S332: Decoding the invisible point code according to the detected parameter to obtain a multi-dimensional coordinate: In this step, the invisible point code is decoded according to the detected parameter to obtain a multi-dimensional coordinate, for example: (Χ, Υ, Ζ. The dimension of the multidimensional coordinates is determined according to the parameters of the automatically detected invisible point code. For details, please refer to Chinese patent: ZL03145092, and US patents: 6256398, 6577748, 6819776, 7123742. This decoding operation utilizes the computing functions of the mobile phone.
值得一提的是, 本实施例中, 上述步骤 S331和步骤 S332及其计算都是在手机上完成的。 本实施例中, 上述步骤 S35可进一步进行细化, 其具体流程图如图 13所示。 步骤 S35其实 提供了一个防伪标识唯一性的鉴定方法, 此鉴定方法的鉴定原理是同一个防伪标识不能在非常相 近的时间内出现在不同的地方。 如果有这样的事情发生, 那么其中一个防伪标识是假的或者两个 一起, 真防伪标识常和真防伪标识在一起。 因为每个防伪标识 (成品是标签) 都与一个批号相对 应, 同一批号的真防伪标识在一起的几率是很高的。 而且假标防伪标识在销售渠道中在一起的几 率也是很高的。 如果一个地方常出现假防伪标识, 那么该地方再次出现同批号的假防伪标识的几 率也特别高。 鉴定的又一个根据是假防伪标识被查询的几率比真防伪标识被查询的几率高, 同一 批号或同一编码的假防伪标识被查询的几率特别高。 根据这些鉴定的原理与几率特征可以建立一 个数学模型来计算唯一性的几率。 一般来讲, 根据统计数据, 如查询频率、 每次查询的时间、 查 询地点和查询时所用的手机特征等等, 可以很准确地判断出一个被查询的标识是否是唯一的。 一 枚假防伪标识可以被造得像真防伪标识一模一样, 但是很难仿造真防伪标识的内容与查询历史。 这样的解读方法直接挑战造假的技术, 使造假变得非常困难。 甚至当假防伪标识与真防伪标识完 全一样时也能被识别出来。 例如: 当查询地点相同, 查询手机不同, 查询时间不同时, 即使查 询频率很高, 被查询的标识是唯一的或然率还是可以很高; 当查询地点不同, 查询手机不同, 查 询时间相近时, 被查询标识就肯定不是唯一的, 因为一个防伪标识不可能同时出现在两个地方。 在后台服务器中存有每个防伪标识的查询统计数据, 只有当被查询的防伪标识是有效的, 是已经 发行的, 而且在唯一的几率很高的条件下, 才能通过唯一性的鉴定。 It is worth mentioning that, in this embodiment, the above steps S331 and S332 and their calculations are all completed on the mobile phone. In this embodiment, the above step S35 can be further refined, and a specific flowchart thereof is shown in FIG. Step S35 actually provides an identification method for the uniqueness of the anti-counterfeiting mark. The identification principle of the identification method is that the same anti-counterfeit mark cannot appear in different places in a very similar time. If something like this happens, then one of the anti-counterfeit signs is fake or two Together, the true security logo is often associated with the true security feature. Because each security mark (the finished product is a label) corresponds to a batch number, the probability of the true security mark of the same batch number is high. Moreover, the probability of false anti-counterfeiting labels being together in the sales channel is also very high. If a fake anti-counterfeiting mark often appears in a place, then the probability of a fake anti-counterfeit mark with the same batch number in the place is particularly high. Another basis for the identification is that the probability that the fake anti-counterfeiting identifier is queried is higher than the probability that the true anti-counterfeiting identifier is queried, and the probability that the same batch number or the same encoded fake anti-counterfeiting identifier is queried is particularly high. Based on the principles of these identifications and probability features, a mathematical model can be built to calculate the probability of uniqueness. Generally speaking, according to statistical data, such as the frequency of the query, the time of each query, the location of the query, and the characteristics of the mobile phone used in the query, it is possible to accurately determine whether a queried identifier is unique. A fake anti-counterfeit logo can be made exactly like a real anti-counterfeit logo, but it is difficult to imitate the content and query history of a true anti-counterfeit logo. Such an interpretation method directly challenges the technology of fraud, making fraud very difficult. Even when the fake anti-counterfeit mark is exactly the same as the true anti-counterfeit mark, it can be recognized. For example: When the query location is the same, the query phone is different, and the query time is different, even if the query frequency is very high, the unique probability of the identifier being queried is still high; when the query location is different, the query phone is different, and the query time is similar, The query ID is certainly not unique, because an anti-counterfeit logo cannot appear in two places at the same time. In the background server, the query statistics of each anti-counterfeit identifier are stored. Only when the anti-counterfeit identifier that is queried is valid, has been issued, and only under the condition of a high probability, the unique identification can be passed.
图 13中, 上述步骤 S35进一步包括:  In Figure 13, the above step S35 further includes:
步骤 S351将防伪标识的编码、标识解读器的身份、查询时间和查询地点传送到后台服务器: 本步骤中, 就是将扫描参数如: 防伪标识的号码 (编码)、 手机特征 (标识解读器的身份)、 查询 时间和查询地点等等送入后台服务器 (后台系统)。  Step S351: transmitting the code of the anti-counterfeit identifier, the identity of the identifier reader, the query time, and the query location to the background server: In this step, the scan parameters are: the number of the anti-counterfeit identifier (code), the characteristics of the mobile phone (identity of the identifier reader) ), query time and query location, etc. are sent to the background server (background system).
步骤 S352 依据标识的编码、 标识解读器的身份、 查询时间和查询地点和扫描记录, 计算出 唯一性的或然率: 本步骤中, 就是根据扫描参数和扫描记录, 计算出唯一性的或然率。  Step S352 calculates the probability of uniqueness according to the code of the identifier, the identity of the identifier, the query time, the query location, and the scan record: In this step, the unique probability is calculated according to the scan parameter and the scan record.
步骤 S353判断或然率是否大于预先设定的门限值: 本步骤中, 判断计算出的或然率是否大 于预先设定的门限值, 如果判断的结果为是, 则执行步骤 S354; 否则, 执行步骤 S355。  In step S353, it is determined whether the probability is greater than a preset threshold. In this step, it is determined whether the calculated likelihood is greater than a preset threshold. If the result of the determination is yes, step S354 is performed; otherwise, step S355 is performed. .
步骤 S354将鉴定成功的信息返回到标识解读器显示:如果上述步骤 S353的判断结果为是, 即唯一性鉴定成功, 则执行本步骤。 本步骤中, 将鉴定成功的信息返回到标识解读器显示。  Step S354 returns the information of the successful authentication to the identifier reader display: if the result of the above step S353 is YES, that is, the uniqueness authentication is successful, the step is executed. In this step, the information of the successful authentication is returned to the identification reader display.
步骤 S355 将鉴定失败的信息返回到标识解读器显示:如果上述步骤 S353的判断结果为否, 即唯一性鉴定失败, 则执行本步骤。 本步骤中, 将鉴定失败的信息返回到标识解读器显示。  Step S355 returns the information of the authentication failure to the identification reader display: if the determination result of the above step S353 is negative, that is, the uniqueness verification fails, this step is performed. In this step, the information of the authentication failure is returned to the identification reader display.
本实施例中, 上述步骤 S36可进一步进行细化, 其具体流程图如图 14所示。 步骤 S36其实 提供了一个防伪标识随机性的鉴定方法, 此随机性的鉴定方法的一个先决条件是将一个完整标识 的背景图文预先存储在后台系统 (后台服务器) 中, 以便与从扫描所得的背景图文相对比。 值得 注意的一点是, 扫描所得的背景图文是不完整的, 是扭曲失真的。  In this embodiment, the above step S36 can be further refined, and a specific flowchart thereof is shown in FIG. 14. Step S36 actually provides an authentication method for the randomness of the anti-counterfeiting identifier. A prerequisite for the authentication method of the randomness is to pre-store a completely-identified background graphic in the background system (background server), so as to be obtained from the scan. The background image is relatively large. It is worth noting that the background image obtained by the scan is incomplete and distorted.
图 14中, 上述步骤 S36进一步包括:  In Figure 14, the above step S36 further includes:
步骤 S361从扫描图像中提取防伪标识的第一背景图文: 本步骤中, 就是从扫描图像中提取 (萃取)防伪标识的第一背景图文 (为了与下述的背景图文相区别, 将此步骤中提取出的背景图文 称为第一背景图文)。  Step S361: extracting the first background image of the anti-counterfeit mark from the scanned image: In this step, the first background image of the anti-counterfeit mark is extracted (extracted) from the scanned image (in order to distinguish from the background image below, The background image extracted in this step is called the first background image).
步骤 S362从后台数据库中提取与防伪标识的编码相对应的防伪标识的第二背景图文, 并将 扫描所得的第一背景图文与后台数据库中提取的第二背景图文进行对比, 得到一个描述相似程度 的第一数值: 本步骤中, 具体就是从后台数据库中提取与防伪标识编码相对应的防伪标识的第二 背景图文, 并用扫描所得的第一背景图文与后台数据库中的第二背景图文进行对比, 从而得到一 个描述相似程度的第一数值。 如何对比两个图像是一个成熟普通的技术。  Step S362 extracts a second background image of the anti-counterfeiting identifier corresponding to the encoding of the anti-counterfeiting identifier from the background database, and compares the scanned first background image with the second background image extracted in the background database to obtain a The first value describing the degree of similarity: In this step, specifically, the second background image of the anti-counterfeiting identifier corresponding to the anti-counterfeit identification code is extracted from the background database, and the first background image and the background database are scanned. The two background images are compared to obtain a first value describing the degree of similarity. How to compare two images is a mature and common technique.
步骤 S363 判断第一数值是否大于设定值: 本步骤中, 判断第一数值是否大于设定值, 如果 判断的结果为是, 则执行步骤 S364 ;否则, 执行步骤 S365。  Step S363: determining whether the first value is greater than the set value: In this step, determining whether the first value is greater than the set value, if the result of the determination is yes, executing step S364; otherwise, executing step S365.
步骤 S364将鉴定成功的信息返回到标识解读器进行显示: 如果上述步骤 S363的判断结果为 是, 即随机性鉴定成功, 则执行本步骤。 本步骤中, 将鉴定成功的信息返回到标识解读器进行显 示。  Step S364 returns the information of the successful authentication to the identifier reader for display: If the result of the above step S363 is YES, that is, the randomness authentication is successful, the step is executed. In this step, the information of the successful authentication is returned to the identification reader for display.
步骤 S365将鉴定失败的信息返回到标识解读器进行显示: 如果上述步骤 S363的判断结果为 否, 即随机性鉴定失败, 则执行本步骤。 本步骤中, 将鉴定失败的信息返回到标识解读器进行显 示。 伪标识真假的方法包括: Step S365 returns the information of the authentication failure to the identifier reader for display: If the result of the above step S363 is negative, that is, the randomness authentication fails, this step is performed. In this step, the information of the authentication failure is returned to the identification reader for display. The methods of pseudo-identification are:
步骤 S41将标识解读器的查询参数传送到后台服务器: 本步骤中, 将标识解读器的查询参数 传送到后台服务器; 上述查询参数包括防伪标识编码、 查询时间、 查询地点和查询标识解读器的 身份或特征。  Step S41: transmitting the query parameter of the identifier to the background server: In this step, the query parameter of the identifier is transmitted to the background server; the query parameters include the security identifier code, the query time, the query location, and the identity of the query identifier reader. Or feature.
步骤 S42后台服务器收集与防伪标识编码相关的查询记录: 本步骤中, 后台服务器收集与查 询的防伪标识编码相关的查询记录; 上述查询记录包括与防伪标识编码 (严格来讲, 防伪标签编 码) 所对应的防伪标识的批号或 /和防伪标识的查询频率或 /和查询时间的分布统计或 /和查询地 点的分布统计或 /和在查询地点出现假冒的频率或 /和出现相同批号的假冒的频率或 /和出现相同 编码的假冒的频率。  Step S42: The background server collects the query record related to the anti-counterfeit identification code: In this step, the background server collects the query record related to the anti-counterfeit identification code of the query; the query record includes the anti-counterfeit identification code (strictly speaking, the anti-counterfeit tag coding) The batch number of the corresponding anti-counterfeit identification or / and the distribution frequency of the anti-counterfeit identification or / and the distribution of the query time or / and the distribution statistics of the query location or / and the frequency of counterfeiting at the query location or / and the frequency of counterfeiting with the same batch number Or / and the frequency of counterfeiting with the same encoding.
步骤 S43依据查询参数和查询记录中的数据, 计算唯一性的或然率: 本步骤中, 根据查询参 数和查询记录中的统计数据, 按照一个数学模型来计算唯一性的几率。 该数学模型可以是一个简 单的方法, 例如: 对各个输入数据进行线性的加权计算, 也可以使用其它比较复杂的方法。  Step S43 calculates the probability of uniqueness according to the query parameter and the data in the query record: In this step, according to the query parameter and the statistical data in the query record, the probability of uniqueness is calculated according to a mathematical model. The mathematical model can be a simple method, such as: performing a linear weighted calculation on each input data, or using other more complicated methods.
步骤 S44判断或然率是否大于预先设定的门限值: 本步骤中, 判断上述计算的或然率是否 大于预先设定的门限值, 如是, 执行步骤 S45; 否则, 执行步骤 S46。  Step S44 determines whether the probability is greater than a preset threshold: In this step, it is determined whether the calculated likelihood is greater than a preset threshold, and if so, step S45 is performed; otherwise, step S46 is performed.
步骤 S45 断定防伪标识为真: 如果上述步骤 S44的判断结果为是, 则执行本步骤, 本步骤 中, 断定防伪标识为真, 也即唯一性鉴定成功, 并将鉴定成功的结果返回到标识解读进行显示。  Step S45: It is determined that the anti-counterfeiting flag is true: if the result of the above step S44 is YES, the step is executed. In this step, it is determined that the anti-counterfeiting flag is true, that is, the uniqueness is successfully authenticated, and the successful result is returned to the identifier interpretation. Display.
步骤 S46 断定防伪标识为假: 如果上述步骤 S44的判断结果为否, 则执行本步骤, 本步骤 中,断定防伪标识为假,也即唯一性鉴定失败,并将鉴定失败的结果返回到标识解读器进行显示。  Step S46: It is determined that the anti-counterfeiting flag is false: If the result of the above step S44 is no, the step is executed. In this step, it is determined that the anti-counterfeiting flag is false, that is, the uniqueness authentication fails, and the result of the authentication failure is returned to the identifier interpretation. Display.
在上述鉴别防伪标识真假的方法中, 分辨真假的根据是防伪标识的唯一性。 分辨真假所需 要的参数包括有标识解读器的查询参数和后台服务器中防伪标识的查询记录。 具体来讲, 分辨真 假的法则是看有没有同一个防伪标识在非常相近的时间内出现在不同的地方, 如果有, 则其中一 个防伪标识是假的或者两个防伪标识都是假的。 分辨真假的另一个法则是物以类聚的原则, 也就 是假防伪标识常和假防伪标识在一起, 真防伪标识常和真防伪标识在一起。 分辨真假的又一个法 则是假防伪标识被查询的几率特别高。 根据防伪标识被查询的模式 (包括时间, 地点, 次数, 查 询时所用的标识解读器等数据) 可以准确地判断出防伪标识的真假。 一枚假防伪标识可以被造得 像真防伪标识一模一样, 但是很难仿造真防伪标识的内容与查询历史。 这样的鉴别方法直接挑战 造假的技术,使造假变得非常困难。甚至当假防伪标识与真防伪标识完全一样时也能被识别出来。  In the above method of identifying the authenticity of the anti-counterfeiting mark, the basis for distinguishing between true and false is the uniqueness of the anti-counterfeiting mark. The parameters required to distinguish between true and false include the query parameters of the identifier reader and the query records of the anti-counterfeit identifiers in the background server. Specifically, the rule of distinguishing between true and false is to see if the same anti-counterfeiting mark appears in a different place in a very similar time. If there is, one of the anti-counterfeit marks is false or both anti-counterfeit marks are false. Another rule for distinguishing between true and false is that the object is clustered together, that is, the fake anti-counterfeiting mark is often associated with the fake anti-counterfeit mark, and the true anti-counterfeit mark is often associated with the true anti-counterfeit mark. Another rule to distinguish between true and false is that the probability of a false security logo being queried is particularly high. According to the mode in which the anti-counterfeiting mark is queried (including time, place, number of times, data such as the identifier reader used for the inquiry), the authenticity of the anti-counterfeit mark can be accurately determined. A fake anti-counterfeit logo can be created exactly like a real anti-counterfeit logo, but it is difficult to imitate the content and query history of a true anti-counterfeit logo. Such identification methods directly challenge the technology of fraud, making fraud very difficult. Even when the fake anti-counterfeit mark is exactly the same as the true anti-counterfeit mark, it can be recognized.
本实施例还涉及一种改变防伪标识权属的方法, 其流程图如图 16所示。 防伪标识权属是指 防伪标识与标识解读器 (本实施例中具体是手机) 使用人之间的所属关系。 一个防伪标识可以有 几种权属状态: 1 )单身, 无权属人状态, 2 )订婚, 有待权属人状态, 3 ) 已婚, 有权属人状态。 防伪标识可以从单身进入订婚状态; 又可以从订婚进入已婚状态; 也可以从已婚进入单身状态; 还可以从一个已婚状态进入另外一个已婚状态。 但防伪标识不能从已婚状态直接进入订婚状态。 改变防伪标识权属就是建立或变更防伪标识与手机使用人之间的关系。 值得注意的一点是改变防 伪标识权属可以应用在二手商品的认证。 该管理方法需要涉及的装置包括: 防伪标识、 拥有摄像 与上网功能的手机和拥有在线功能的后台服务器。  The embodiment further relates to a method for changing the ownership of an anti-counterfeiting identifier, and the flowchart thereof is as shown in FIG. 16. The anti-counterfeiting identification attribute refers to the belonging relationship between the anti-counterfeiting identification and the identifier interpreter (in this embodiment, specifically the mobile phone). An anti-counterfeiting logo can have several tenure states: 1) single, no right to belong to the person, 2) engaged, pending ownership, 3) married, entitled to personal status. The anti-counterfeiting logo can enter the engaged state from a single person; it can also enter the married state from the engagement; it can also enter the single state from the married state; it can also enter another married state from one married state. However, the anti-counterfeiting logo cannot enter the engaged state directly from the married state. Changing the security of the anti-counterfeiting logo is to establish or change the relationship between the anti-counterfeiting logo and the user of the mobile phone. It is worth noting that changing the security of the anti-counterfeiting logo can be applied to the certification of second-hand goods. The management methods involved include: anti-counterfeit identification, mobile phones with camera and Internet access, and back-end servers with online functions.
图 16中, 该改变防伪标识权属的方法包括:  In Figure 16, the method for changing the security of the security identification includes:
步骤 S51 提出防伪标识所有权变更请求: 本步骤中, 提出防伪标识所有权变更请求 (权属 变更请求) 的方法与防伪标识图像的解码方法相似。 提出防伪标识所有权变更请求的实施是通过 扫描防伪标识来完成的。  Step S51 proposes an anti-counterfeiting identification change request: In this step, the method of proposing the anti-counterfeiting identification change request (the right change request) is similar to the decoding method of the anti-counterfeit identification image. The implementation of the anti-counterfeiting identity change request is implemented by scanning the anti-counterfeiting identifier.
步骤 S52 根据防伪标识的权属状态显示所有权的变更菜单: 本步骤中, 根据防伪标识的权 属状态显示所有权的变更菜单。  Step S52: Display the ownership change menu according to the ownership status of the anti-counterfeiting identifier: In this step, the ownership change menu is displayed according to the ownership status of the anti-counterfeiting identifier.
步骤 S53从变更菜单中选择一个选项并进行选项的相关操作: 本步骤中, 从变更菜单中选择 一个选项并进行选项的相关操作; 上述选项包括获取防伪标识所有权或出让防伪标识所有权或放 弃防伪标识所有权。 具体来讲, 当用户选择获取防伪标识所有权的选项后, 在确认防伪标识处在 无权属人状态之后,进入获取防伪标识所有权相关操作。当用户选出让防伪标识所有权的选项后, 根据手机特征确认使用者拥有防伪标识, 然后进入出让防伪标识所有权相关操作。 当用户选择放 弃防伪标识所有权的选项后, 根据手机特征确认使用者拥有防伪标识, 然后更新数据库记录, 使 对于本实施例而言, 上述获取防伪标识所有权的方法的流程图如图 17所示。 图 17中, 该获 取防伪标识所有权的方法包括: Step S53 selects an option from the change menu and performs related operations of the option: In this step, an option is selected from the change menu and the related operation of the option is performed; the above options include obtaining the ownership of the security mark or assigning the ownership of the anti-counterfeit mark or giving up the anti-counterfeit mark. ownership. Specifically, after the user selects the option of obtaining the ownership of the anti-counterfeiting identifier, after confirming that the anti-counterfeiting identifier is in the unlicensed state, the user enters the operation of acquiring the security identification ownership. After the user selects the option for ownership of the anti-counterfeiting mark, the user is confirmed to have the anti-counterfeit mark according to the characteristics of the mobile phone, and then enters the operation related to the ownership of the anti-counterfeiting mark. When the user chooses to abandon the option of ownership of the security mark, confirm that the user has the security mark according to the characteristics of the phone, and then update the database record, so that For the present embodiment, the above-described flowchart of the method for acquiring the ownership of the anti-counterfeit mark is as shown in FIG. In Figure 17, the method for obtaining ownership of the security feature includes:
步骤 S61 显示防伪标识所有权表格, 并提示用户输入表格内容: 本步骤中, 显示防伪标识 所有权表格, 并提示用户输入表格内容。  Step S61 displays the anti-counterfeiting identification ownership form and prompts the user to input the form content: In this step, the anti-counterfeiting identification ownership form is displayed, and the user is prompted to input the form content.
步骤 S62 系统依据扫描记录来判断用户是否拥有防伪标识的控制权: 本步骤中, 防伪标识 所有权进入判决期, 系统将根据扫描记录来判断用户是否拥有防伪标识的控制权, 如果判断的结 果为是, 则执行步骤 S62 ;否则, 执行步骤 S64。 值得一提的是, 在在判决期内, 用户可通过更换 时间或地点对防伪标识进行扫描, 以示范拥有防伪标识的控制权。 值得一提的是, 本实施例中, 手机用户对防伪标识的充分控制权等同于对被标识物体的所有权。  Step S62: The system determines, according to the scan record, whether the user has the control right of the anti-counterfeit identifier: In this step, the ownership of the anti-counterfeit identifier enters the judgment period, and the system determines whether the user has the control right of the anti-counterfeit identifier according to the scan record, and if the judgment result is yes Then, step S62 is performed; otherwise, step S64 is performed. It is worth mentioning that during the judgment period, the user can scan the anti-counterfeiting mark by changing the time or place to demonstrate the control of possessing the anti-counterfeiting mark. It is worth mentioning that, in this embodiment, the mobile phone user has sufficient control over the anti-counterfeiting identifier to be equal to the ownership of the identified object.
步骤 S63用户获得防伪标识所有权, 系统更新数据库中所有权记录: 如果上述步骤 S62的 判断结果为是,则执行本步骤。本步骤中,根据扫描记录,系统确认用户拥有防伪标识控制权后, 将显示防伪标识所有权判决, 防伪标识退出判决期进入有权属人状态。 于此同时, 用户获得防伪 标识所有权, 系统也更新数据库所有权记录。  Step S63: The user obtains the ownership of the anti-counterfeit flag, and the system updates the ownership record in the database: If the result of the above step S62 is YES, the step is executed. In this step, according to the scan record, after the system confirms that the user has the control right of the anti-counterfeit mark, the system will display the security status judgment of the anti-counterfeit mark, and the anti-counterfeit mark exits the judgment period and enters the state of the right owner. At the same time, the user obtains ownership of the anti-counterfeiting identity and the system also updates the database ownership record.
步骤 S64退出本次操作: 如果上述步骤 S62的判断结果为否, 则执行本步骤, 本步骤中, 退出本次操作。  Step S64 quits the current operation: If the result of the above step S62 is no, the present step is executed. In this step, the current operation is exited.
本实施例中,后台服务器是一个仲裁人的角色,其职责之一是验证一个权属主张的真实性, 并对该主张做出判决。 如果标识物是在一个公共场所, 任何人都可以用手机扫描标识的方法提出 权属主张。只有在主张被验证之后,后台服务器才做出权属的判决,并更新数据库中的权属记录。 验证权属主张的方法是由后台服务器担任一个仲裁人的角色, 根据防伪标识查询记录来裁定手机 用户对防伪标识的控制权。 权属主张的验证方法是要求用户在不同的时间或地点扫描防伪标识, 以示范拥有对防伪标识的控制权。 该方法的原理是根据扫描的时间、 地点和手机特征等数据, 可 以有效地判断出手机用户是否对标识物拥有实际的控制权。 举例来说, 如果一个手机用户在不同 的地方扫描同一个防伪标识, 该用户拥有控制权的几率非常高。 如果一个用户在同一个地方, 不 同的时间多次扫描同一个防伪标识, 该用户拥有控制权的几率也非常高。 当该几率高过一个门限 数值后,所属权就被裁定归手机用户。另外,权属主张的验证与判决需要一段时间,称为有待期。 这有待期的时间长短不是一定的, 只有当系统接收到充分的扫描数据后, 系统才做出裁定。  In this embodiment, the background server is an arbitrator's role, and one of its duties is to verify the authenticity of a claim of ownership and make a judgment on the claim. If the marker is in a public place, anyone can use the mobile phone to scan the logo to make a claim. Only after the claim is verified, the background server makes the decision of the ownership and updates the ownership record in the database. The method of verifying the ownership claim is that the back-end server acts as an arbitrator, and the mobile phone user's control over the anti-counterfeiting identification is determined according to the anti-counterfeiting identification query record. The authentication method of the tenure claim is to require the user to scan the anti-counterfeit logo at different times or places to demonstrate possession of control over the anti-counterfeiting logo. The principle of the method is to effectively determine whether the mobile phone user has actual control over the identifier based on data such as the time, location and characteristics of the mobile phone. For example, if a mobile phone user scans the same anti-counterfeit logo in a different location, the probability that the user has control is very high. If a user is in the same place and scans the same anti-counterfeit identifier multiple times at different times, the chances of the user having control are also very high. When the probability is higher than a threshold value, the ownership is determined to belong to the mobile phone user. In addition, the verification and judgment of the tenure claims take a period of time and is called a pending period. The length of this waiting period is not certain. Only when the system receives sufficient scan data, the system makes a ruling.
对于本实施例而言, 上述出让防伪标识所有权的方法流程图如图 18所示。 在该出让防伪标 识所有权的方法中, 防伪标识可以被显示在手机的屏幕上, 也可以从手机屏幕上读取防伪标识内 容。 防伪标识所有权的出让是不需要经过有待期的, 只需将一特殊编码加在原有防伪标识的编码 上之后, 一起嵌入在防伪标识所有权状中, 然后显示在手机屏幕上。 所有权的出让是通过一个动 作来完成的, 就是接收人用手机扫描出让人手机上的标识所有权状。 该所有权状既显示与用户沟 通的视觉信息, 又显示与机器沟通的功能信息。 在这个动作中, 所有权状显示出让内容给出让人 和接收人查看, 同时其中的特殊编码通知后台服务器将防伪标识的所有权从出让人转到接收人。  For the present embodiment, the flow chart of the method for assigning the ownership of the anti-counterfeiting mark is as shown in FIG. 18. In the method of assigning the security of the anti-counterfeiting mark, the anti-counterfeit mark can be displayed on the screen of the mobile phone, and the content of the anti-counterfeit mark can also be read from the screen of the mobile phone. The transfer of the ownership of the anti-counterfeiting mark does not need to be pending. After adding a special code to the code of the original anti-counterfeit mark, it is embedded in the ownership of the anti-counterfeit mark and then displayed on the screen of the mobile phone. The transfer of ownership is done through an action, that is, the recipient scans the identity of the logo on the mobile phone with the mobile phone. This ownership displays both visual information that communicates with the user and functional information that communicates with the machine. In this action, the ownership indicates that the content is given to the viewer and the recipient, and the special code in it informs the backend server to transfer ownership of the security token from the transferor to the recipient.
图 18中, 该出让防伪标识所有权的方法包括:  In Figure 18, the method for assigning ownership of the anti-counterfeiting mark includes:
步骤 S71 按照出让防伪标识所有权状的内容生成一个背景图文: 本步骤中, 按照出让防伪 标识所有权状的内容生成一个背景图文。  Step S71: Generate a background image according to the content of the ownership of the security symbol: In this step, a background image is generated according to the content of the ownership of the security symbol.
步骤 S72 将出让所有权的编码加到出让防伪标识的编码上构成第一编码,并将第一编码嵌 入到所有权状的背景图文中: 本步骤中, 将出让所有权的编码加到出让防伪标识的编码上构成第 一编码, 并将第一编码嵌入到所有权状的背景图文中。  Step S72: adding the code of the transfer ownership to the code of the transfer security mark to form the first code, and embedding the first code into the background image of the ownership: In this step, the code of the transfer ownership is added to the transfer security mark. The first code is formed on the code, and the first code is embedded in the background image of the ownership.
步骤 S73 在出让方的第一标识解读器上显示第一编码所嵌入的所有权状: 本步骤中, 具体 就是在出让方(出让人)的第一标识解读器 (具体是出让人的手机)上显示有特殊编码 (第一编码) 所嵌入的所有权状。  Step S73: displaying the ownership embedded in the first code on the first identifier reader of the transfer party: in this step, specifically, on the first identifier reader (specifically, the mobile phone of the transferor) of the transferor (transfer) The ownership code embedded in the special code (first code) is displayed.
步骤 S74接收方用第二标识解读器扫描出让方的第一标识解读器上的所有权状:本步骤中, 接收方 (接收人)用第二标识解读器 (接收人的手机)扫描出让方 (出让人) 的第一标识解读器 (出 让人的手机) 上的所有权状。  Step S74: The receiver scans the ownership of the first identifier reader of the transfer party with the second identifier reader: in this step, the receiver (recipient) scans the transfer party with the second identifier reader (receiver's mobile phone) ( Ownership of the first identification reader (the transferor's mobile phone) on the ownership.
步骤 S75接收方在第二标识解读器上确认所有权的变更: 本步骤中, 接收方在第二标识解 读器 (接收人的手机) 上确认所有权的变更。 统更新数据库记录, 将防伪标识的所有权从出让方 (出让人) 转给接收方 (接收人)。 总之, 在本实施例中, 防伪标识不仅提供视觉上文字与图像的描绘, 而且提供隐秘性的链接 热点, 将防伪标识与相关的标识信息通过网络链接起来。 该防伪标识可以被广泛地使用在各个领 域。 防伪标识内容可以是直接打印在纸类物品上, 如门票、 邮票、 钞票、 股票、 保密文件、 土地 权状、房屋权状等。防伪标识内容也可以是直接打印在塑胶类物品上, 如信用卡、金融卡、驾照、 识别证、 证照、 身份证、 护照等。 使用激光雷射雕刻机, 防伪标识内容还可以是直接打印在金属 类物体上。 防伪标识内容甚至可以被显示在电视、 电脑与手机的屏幕上。 除此之外, 也可预先制 造防伪标签, 然后将防伪标签贴在物品上。 这样的应用包括有一般商品和商品的包装, 例如: 食品、 药品、 精品、 烟、 酒、 运动用品和电子产品等等。 Step S75: The recipient confirms the change of ownership on the second identification reader: In this step, the recipient confirms the change of ownership on the second identification reader (receiver's mobile phone). The database records are updated to transfer the ownership of the anti-counterfeiting mark from the transferor (granter) to the recipient (recipient). In summary, in the present embodiment, the anti-counterfeit identification not only provides visual depiction of images and images, but also provides a hidden link hotspot, and links the anti-counterfeit identification and related identification information through the network. This anti-counterfeit mark can be widely used in various fields. Anti-counterfeit identification content can be printed directly on paper items such as tickets, stamps, banknotes, stocks, confidential documents, land rights, housing rights, and the like. Anti-counterfeiting logo content can also be printed directly on plastic items, such as credit cards, financial cards, driver's licenses, identification cards, licenses, ID cards, passports, etc. With a laser laser engraving machine, the anti-counterfeiting label content can also be printed directly on metal objects. Anti-counterfeit identification content can even be displayed on the screens of TVs, computers and mobile phones. In addition to this, it is also possible to pre-manufacture an anti-counterfeit label and then attach the anti-counterfeit label to the item. Such applications include packaging of general merchandise and merchandise, such as: food, medicines, boutiques, cigarettes, wine, sporting goods, and electronics.
长期以来, 尽管政府在打假领域做了很多努力, 但假冒行为仍然不断扩大, 主要原因之一是 缺乏高科技的市场监管手段。 本实施例提供一套技术门槛高、 防伪力度高和方便使用的隐形点码 防伪系统, 该隐形点码防伪系统综合了数码防伪技术与印刷工艺, 手机识别与在线数据库的联合 操作, 在发现假冒的第一时间, 会自动通知用户, 厂商与政府相关部门。 这样的措施提供了一个 市场自动监管的机制, 使政府相关部门可以即时缉查假冒来源, 能够更加有效地打击市场上的假 冒行为。  For a long time, although the government has made a lot of efforts in the field of counterfeiting, counterfeiting continues to expand. One of the main reasons is the lack of high-tech market supervision. The embodiment provides a set of invisible point code anti-counterfeiting system with high technical threshold, high anti-counterfeiting strength and convenient use. The invisible point code anti-counterfeiting system integrates digital anti-counterfeiting technology and printing process, and the combined operation of the mobile phone identification and the online database is found to be counterfeit. The first time, the user will be automatically notified, the manufacturer and the relevant government departments. Such measures provide a mechanism for automatic market supervision, enabling the relevant government departments to immediately investigate the source of counterfeiting and more effectively combat counterfeiting in the market.
目前市场上的防伪标识如一般的条码、 二维码、 全息照相、 水印和纹密等标识都不具有一个 标识多项功能的优势, 并且防伪标识与防伪标识之间也是不能相互重叠的, 这样的限制使这些防 伪标识不容易应用在小物体上, 如: 小药瓶, 化妆品等等。 在本实施例中, 在一个小面积的防伪 标识内可以包含有多个链接热点,拥有多项功能,并且链接热点所占有的区域可以是相户独立的, 也可以是相互重叠的, 而且链接热点之间的分辨度可以小到几毫米。  At present, the anti-counterfeiting labels on the market, such as general barcodes, two-dimensional codes, holograms, watermarks, and fingerprints, do not have the advantage of identifying multiple functions, and the anti-counterfeiting labels and the anti-counterfeiting labels cannot overlap each other. The restrictions make these anti-counterfeiting labels not easy to apply to small objects, such as: small bottles, cosmetics, etc. In this embodiment, a small area of the anti-counterfeit identifier may include a plurality of link hotspots, and has multiple functions, and the areas occupied by the link hotspots may be independent of each other, or may overlap each other, and link The resolution between hotspots can be as small as a few millimeters.
一般来讲, 防伪标识的随机性与可读性是相互矛盾的, 提高随机性会降低可读性, 提高可读 性又不得不降低随机性。 同样地, 防伪标识的隐秘性与可读性也是相互矛盾的。 在目前的技术中 有许多可读性高、 隐秘性低或随机性低的技术, 如背景技术中的案例二; 也有随机性高、 可读性 低的技术, 如背景技术中的案例三; 还有隐秘性高、 可读性低的技术, 如背景技术中的案例四。 而本实施例在解读方法上有全新的突破。该解读方法解决了隐秘性、随机性与可读性之间的矛盾, 使防伪标识可同时拥有很好的隐秘性、 完全的随机性和 100%的机器识读的能力。  In general, the randomness and readability of anti-counterfeiting labels are contradictory. Increasing randomness reduces readability and improves readability and reduces randomness. Similarly, the privacy and readability of anti-counterfeiting labels are also contradictory. In the current technology, there are many technologies with high readability, low concealment or low randomness, such as case 2 in the background art; there are also techniques with high randomness and low readability, such as case 3 in the background art; There are also techniques that are high in privacy and low in readability, such as Case 4 in the background. In this embodiment, there is a new breakthrough in the interpretation method. The interpretation method solves the contradiction between concealment, randomness and readability, so that the anti-counterfeiting logo can have good concealment, complete randomness and 100% machine reading ability.
本实施例在防伪力度上有全新的突破。 识别仿冒的能力一直以来都是防伪技术的一个重要指 标。 当赝品与真品是 100%的相同时, 现有的识别技术都立刻失效。 而在本实施例中, 即使赝品与 真品是完全相同的, 根据防伪标识的唯一性和范围标识被查询的记录可以很有效地判断出某一标 识被仿冒。  This embodiment has a new breakthrough in the security of anti-counterfeiting. The ability to identify counterfeiting has long been an important indicator of anti-counterfeiting technology. When the counterfeit and the authenticity are 100% identical, the existing identification technology is immediately invalid. In the present embodiment, even if the defective product is identical to the genuine product, the recorded record can be effectively judged based on the uniqueness and range of the security mark to be counterfeited.
现在市场上的防伪技术皆存在着两种现象。 其一是方便检测, 但技术质量过低, 容易破解。 其二是技术质量高, 但检测不便, 有的需要很长的时间, 不符合经济效益。 除此之外, 市场上还 看不到一个有效的方法, 能够使消费者对防伪标识进行机器识读, 这样的限制极大地阻碍了防伪 技术的推广应用。 相比之下, 本实施例提供了一个自助式的解读方法, 其特点是技术质量高, 不 容易被破解, 检测既即方便又快捷。 用户使用手机来识别商品真伪, 只需要一个动作 (就是对准 防伪标识), 不需要按其它任何键, 只要几秒钟就可以得到准确的答案。  There are two phenomena in the anti-counterfeiting technology on the market today. One is convenient for testing, but the technical quality is too low and easy to crack. The second is the high quality of the technology, but the detection is inconvenient, and some need a long time, which is not economical. In addition, there is no effective method in the market that enables consumers to machine the anti-counterfeiting mark. Such restrictions greatly hinder the promotion and application of anti-counterfeiting technology. In contrast, the present embodiment provides a self-service interpretation method, which is characterized by high technical quality, is not easy to be cracked, and detection is convenient and fast. The user uses the mobile phone to identify the authenticity of the product. It only needs one action (that is, the anti-counterfeiting mark). It does not need to press any other keys, and only a few seconds can get an accurate answer.
一般来讲, 在一个防伪技术体系内, 最软弱的地方就是产品生产制造的秘密。 当造假的人沟 通内贼得到生产制造的秘密, 或窃取了编码方法, 就很容易找到破解之道。 而实施例综合了多样 防伪措施(如防伪标识编码,背景图文,手机识别器或手机解读器,后台服务器,鉴定方法等等), 即使在编码方法被窃取, 标识制造秘密被公开的境况下, 防伪系统仍然是安全的。  Generally speaking, in an anti-counterfeiting technology system, the weakest place is the secret of product manufacturing. It is easy to find the way to crack when the fraudulent person gets the secret of manufacturing or steals the coding method. The embodiment combines various anti-counterfeiting measures (such as anti-counterfeiting identification code, background graphic, mobile phone recognizer or mobile phone reader, background server, authentication method, etc.), even in the case where the encoding method is stolen and the identification manufacturing secret is disclosed. The anti-counterfeiting system is still safe.
以上所述实施例仅表达了本发明的几种实施方式, 其描述较为具体和详细, 但并不能因此而 理解为对本发明专利范围的限制。 应当指出的是, 对于本领域的普通技术人员来说, 在不脱离本 发明构思的前提下, 还可以做出若干变形和改进, 这些都属于本发明的保护范围。 因此, 本发明 专利的保护范围应以所附权利要求为准。  The above-mentioned embodiments are merely illustrative of several embodiments of the present invention, and the description thereof is not to be construed as limiting the scope of the invention. It should be noted that a number of variations and modifications may be made by those skilled in the art without departing from the spirit and scope of the invention. Therefore, the scope of the invention should be determined by the appended claims.

Claims

权利要求书  Claim
1、 一种隐形点码防伪系统, 其特征在于, 包括用于传递商品信息的防伪标识、 用于通过获 取所述防伪标识的数字化图像以鉴定所述防伪标识真伪的标识解读器以及用于储存已发行的所 述防伪标识的编码和相关商品鉴定信息、 并辅助所述标识解读器对所述防伪标识进行真伪鉴定的 后台服务器; 所述防伪标识包括隐形点码、 背景图文和载体; 所述背景图文设置在所述载体上, 所述隐形点码嵌入在所述背景图文中并通过网络将所述防伪标识及其信息链接。  An invisible point code anti-counterfeiting system, comprising: an anti-counterfeit identifier for transmitting commodity information, an identifier reader for acquiring a digitized image of the anti-counterfeit identifier to identify authenticity of the anti-counterfeit identifier, and Storing the code of the anti-counterfeit identification issued and the related commodity identification information, and assisting the background reader in authenticating the authenticity identification of the anti-counterfeit identifier; the anti-counterfeiting identifier includes an invisible point code, a background image and a carrier The background image is disposed on the carrier, and the invisible dot code is embedded in the background graphic and links the anti-counterfeiting identifier and its information through a network.
2、 根据权利要求 1 所述的隐形点码防伪系统, 其特征在于, 所述标识解读器包括用于获取 所述防伪标识的数字化图像的摄像单元、 用于控制各单元进行相应操作的主控单元、 用于与所述 后台服务器进行通讯的通讯单元和用于显示信息的显示单元。  2. The invisible point code anti-counterfeiting system according to claim 1, wherein the identifier interpreter comprises an image capturing unit for acquiring a digitized image of the anti-counterfeiting identifier, and a main control for controlling each unit to perform corresponding operations. a unit, a communication unit for communicating with the background server, and a display unit for displaying information.
3、 根据权利要求 2所述的隐形点码防伪系统, 其特征在于, 所述隐形点码包括以设定的编 码方式进行排列并在排列后嵌入在所述背景图文中多个彩色微点。  3. The invisible dot code anti-counterfeiting system according to claim 2, wherein the invisible dot code comprises a plurality of color micro dots embedded in the background image after being arranged in a set encoding manner. .
4、 根据权利要求 3 所述的隐形点码防伪系统, 其特征在于, 所述隐形点码携带所述防伪标 识的编码信息, 所述背景图文是随机生成的并携带防伪内容, 所述载体包括纸类媒介或塑胶类媒 介或金属类媒介或电脑屏幕或手机屏幕; 所述编码信息包括一维编码或多维编码。  The invisible point code anti-counterfeiting system according to claim 3, wherein the invisible point code carries the encoding information of the anti-counterfeit identifier, the background graphic is randomly generated and carries anti-counterfeiting content, and the carrier Including paper-based or plastic-based media or metal-based media or computer screens or mobile phone screens; the encoded information includes one-dimensional coding or multi-dimensional coding.
5、 根据权利要求 4所述的隐形点码防伪系统, 其特征在于, 所述多维编码包括所述载体的 编码和所述防伪标识位置的编码; 所述多维编码由 26位十进制数字表示; 所述载体上任一点或 任一区域用多维坐标来界定。  The invisible point code anti-counterfeiting system according to claim 4, wherein the multi-dimensional code comprises an encoding of the carrier and an encoding of the location of the anti-counterfeit identifier; the multi-dimensional encoding is represented by a 26-digit decimal number; Any point or any area on the carrier is defined by multidimensional coordinates.
6、 一种在数字化文件中嵌入隐形点码的方法, 其特征在于, 包括如下步骤:  6. A method for embedding an invisible point code in a digitized file, comprising the steps of:
A1 )将一个数字化文件转换成一个数字化的图像, 将所述数字化的图像作为防伪标识的背景 图文;  A1) converting a digitized file into a digitized image, using the digitized image as a background image of the anti-counterfeit logo;
B1 ) 按照设定的编码方式计算当前彩色微点在所述背景图文中的坐标位置;  B1) calculating a coordinate position of the current color micro-dot in the background image according to a set coding manner;
C1 ) 以所述彩色微点的位置为定点计算所述背景图文的本地颜色;  C1) calculating a local color of the background graphic by using a position of the color micro dot as a fixed point;
D1 ) 将所述本地颜色的反向颜色或黄色嵌入在所述背景图文中所述定点的位置;  D1) embedding the inverse color or yellow of the local color in the position of the fixed point in the background image;
E1 ) 判断所有的彩色微点是否都嵌入在所述背景图文中, 如是, 结束本次嵌入操作; 否则, 获取下一个彩色微点并返回步骤 Bl )。  E1) judge whether all the color micro dots are embedded in the background image, and if so, end the embedding operation; otherwise, obtain the next color micro dot and return to step Bl).
7、 一种防伪标签的形成方法, 其特征在于, 包括如下步骤:  7. A method for forming an anti-counterfeit label, comprising the steps of:
A2)随机生成一个数字化文件并将其转换成一个数字化图像;  A2) randomly generating a digitized file and converting it into a digitized image;
B2 ) 将防伪标识的编码信息或所述数字化图像传送到后台服务器;  B2) transmitting the encoded information of the anti-counterfeit identification or the digitized image to a background server;
C2 ) 将所述防伪标识的隐形点码嵌入在所述数字化文件中;  C2) embedding the invisible point code of the anti-counterfeit identifier in the digitized file;
D2 ) 设定对所述防伪标识查询时所反馈的信息并将所述反馈的信息传送到后台服务器; 所述 反馈的信息包括相关的鉴定结果或 /和文字或 /和图像或 /和网页或 /和短片或 /和广告;  D2) setting information fed back when the anti-counterfeiting identifier is queried and transmitting the feedback information to a background server; the feedback information includes relevant authentication results or/and text and/or images or/and web pages or / and short films or / and ads;
E2 ) 将已嵌入隐形点码的数字化文件打印在载体上;  E2) printing the digitized file embedded with the invisible dot code on the carrier;
F2 ) 从已打印的载体上任意或按照一定规则划分出多个防伪标签。  F2) Multiple security labels are assigned arbitrarily or according to certain rules from the printed carrier.
8、 一种防伪标识的解读方法, 其特征在于, 包括如下步骤:  8. A method for interpreting an anti-counterfeit mark, comprising the steps of:
A3)标识解读器对防伪标识进行扫描;  A3) The identifier reader scans the anti-counterfeit logo;
B3 ) 从所述标识解读器的视频数据流中提取当前数字化的图像;  B3) extracting the current digitized image from the video data stream of the identification reader;
C3 ) 从所述数字化的图像中提取隐形点码, 并对其进行解码得到一个多维坐标;  C3) extracting an invisible point code from the digitized image and decoding it to obtain a multidimensional coordinate;
D3 ) 将解码得到的参数传送到后台服务器; 所述解码得到的参数包括扫描图像、 多维坐标、 查询时间、 查询地点和标识解读器身份信息;  D3) transmitting the decoded parameters to the background server; the parameters obtained by the decoding include scan image, multidimensional coordinates, query time, query location, and identifier reader identity information;
E3 )所述后台服务器对所述防伪标识作唯一性鉴定并将鉴定结果返回到所述标识解读器; 所 述鉴定所需的参数包括多维坐标、 查询时间、 查询地点和标识解读器身份信息;  E3) the background server uniquely identifies the anti-counterfeiting identifier and returns the identification result to the identifier reader; the parameters required for the identification include multi-dimensional coordinates, query time, query location, and identifier reader identity information;
F3 所述后台服务器将所述扫描图像与事先存储的背景图文进行对比并将对比结果返回到所 述标识解读器;  F3, the background server compares the scanned image with a previously stored background image and returns the comparison result to the identifier reader;
G3 ) 查询后台数据库, 提取与所述多维坐标相对应的第一数据, 并将所述第一数据传送回给 所述标识解读器;  G3) querying the background database, extracting first data corresponding to the multidimensional coordinates, and transmitting the first data back to the identifier reader;
H3 ) 在所述标识解读器上显示所述第一数据; 所述第一数据包括鉴定结果或 /和相关的文字 或 /和图像或 /和网页或 /和短片。 9、 WO 2014/139386: 8所述的防伪标识的解读方法, 其特征在于, 所^( 1 ^014/073140包括:H3) displaying the first data on the identification reader; the first data comprising an identification result or/and associated text or/and image or/and a web page or/and a movie. 9. The method for interpreting the anti-counterfeiting mark described in WO 2014/139386: 8, characterized in that: (1 ^ 014 / 073140 includes:
C31 ) 从所述数字化的图像中自动侦测出各种隐形点码的参数; 所述侦测的参数包括编码类 型、 编码维数、 大小和取向; C31) automatically detecting parameters of various invisible point codes from the digitized image; the detected parameters include an encoding type, an encoding dimension, a size, and an orientation;
C32) 依据所述侦测的参数对所述隐形点码进行解码得到一个多维坐标。  C32) Decoding the invisible point code according to the detected parameter to obtain a multi-dimensional coordinate.
10、 根据权利要求 8或 9所述的防伪标识的解读方法, 其特征在于, 所述步骤 E3)进一步包 括:  The method for interpreting the anti-counterfeiting mark according to claim 8 or 9, wherein the step E3) further comprises:
E31 ) 将防伪标识的编码、 标识解读器的身份、 查询时间和查询地点传送到后台服务器; E32) 依据所述防伪标识的编码、 标识解读器的身份、 查询时间和查询地点和扫描记录, 计 算出唯一性的或然率;  E31) transmitting the code of the anti-counterfeit mark, the identity of the identifier reader, the query time and the query location to the background server; E32) calculating according to the code of the anti-counterfeit mark, the identity of the identifier reader, the query time, the query place and the scan record The probability of uniqueness;
E33) 判断所述或然率是否大于预先设定的门限值, 如是, 将鉴定成功的信息返回到所述标 识解读器显示; 否则, 将鉴定失败的信息返回到所述标识解读器显示。  E33) determining whether the likelihood is greater than a preset threshold, and if so, returning the information of the successful authentication to the identification reader display; otherwise, returning the information of the authentication failure to the identification reader display.
11、根据权利要求 10所述的防伪标识的解读方法,其特征在于,所述步骤 F3)进一步包括: The method of claim 10, wherein the step F3) further comprises:
F31 ) 从所述扫描图像中提取所述防伪标识的第一背景图文; F31) extracting, from the scanned image, a first background image of the anti-counterfeit identifier;
F32) 从所述后台数据库中提取与所述防伪标识的编码相对应的防伪标识的第二背景图文, 并将所述扫描所得的第一背景图文与所述后台数据库中提取的第二背景图文进行对比, 得到一个 描述相似程度的第一数值;  F32) extracting, from the background database, a second background image of the anti-counterfeiting identifier corresponding to the encoding of the anti-counterfeiting identifier, and extracting the first background image obtained by the scanning and the second background extracted in the background database The background image is compared to obtain a first value describing the degree of similarity;
F33) 判断所述第一数值是否大于设定值, 如是, 将鉴定成功的信息返回到所述标识解读器 进行显示; 否则, 将鉴定失败的信息返回到所述标识解读器进行显示。  F33) determining whether the first value is greater than a set value, and if yes, returning the information of the successful authentication to the identifier reader for display; otherwise, returning the information of the authentication failure to the identifier reader for display.
一种鉴别防伪标识真假的方法, 其特征在于, 包括如下步骤:  A method for identifying authenticity of an anti-counterfeiting mark, comprising the steps of:
A4)将标识解读器的查询参数传送到后台服务器; 所述查询参数包括防伪标识编码、 查询时间、 查询地点和查询标识解读器的身份;  A4) transmitting the query parameter of the identifier reader to the background server; the query parameter includes the anti-counterfeiting identifier code, the query time, the query location, and the identity of the query identifier reader;
B4)后台服务器收集与所述防伪标识编码相关的查询记录;  B4) The background server collects the query record related to the anti-counterfeit identification code;
C4) 依据所述查询参数和查询记录中的数据, 计算唯一性的或然率;  C4) calculating a likelihood of uniqueness according to the query parameter and the data in the query record;
D4) 判断所述或然率是否大于预先设定的门限值, 如是, 断定所述防伪标识为真; 否 则, 断定所述防伪标识为假。  D4) determining whether the probability is greater than a preset threshold, and if so, determining that the anti-counterfeiting flag is true; otherwise, determining that the anti-counterfeiting flag is false.
13、 一种改变防伪标识权属的方法, 其特征在于, 包括如下步骤:  13. A method of changing the ownership of an anti-counterfeiting identifier, comprising the steps of:
A5) 提出防伪标识所有权变更请求;  A5) Propose a request for change of ownership of the anti-counterfeiting mark;
B5) 根据所述防伪标识的权属状态显示所有权的变更菜单;  B5) displaying a change menu of ownership according to the ownership status of the anti-counterfeiting identifier;
C5) 从所述变更菜单中选择一个选项并进行所述选项的相关操作; 所述选项包括获取防伪标 识所有权或出让防伪标识所有权或放弃防伪标识所有权。  C5) selecting an option from the change menu and performing an operation related to the option; the option includes obtaining anti-counterfeit identification ownership or assigning anti-counterfeit identification ownership or abandoning anti-counterfeiting identification ownership.
14、 根据权利要求 13 所述的改变防伪标识权属的方法, 其特征在于, 所述获取防伪标识所 有权的方法包括如下步骤:  The method for changing the ownership of an anti-counterfeiting identifier according to claim 13, wherein the method for obtaining the ownership of the anti-counterfeiting identifier comprises the following steps:
A6) 显示防伪标识所有权表格, 并提示用户输入表格内容;  A6) Display the security identification ownership form and prompt the user to enter the form content;
B6)系统依据扫描记录来判断用户是否拥有防伪标识的控制权; 如是,执行步骤 C6); 否则, 退出本次操作;  B6) The system determines whether the user has the control right of the anti-counterfeit mark according to the scan record; if yes, step C6); otherwise, exits the operation;
C6) 用户获得防伪标识所有权, 系统更新数据库中所有权记录。  C6) The user obtains ownership of the security mark and the system updates the ownership record in the database.
15、 根据权利要求 13 所述的改变防伪标识权属的方法, 其特征在于, 所述出让防伪标识所 有权的方法包括如下步骤:  The method for changing the ownership of an anti-counterfeit identification according to claim 13, wherein the method for assigning the ownership of the anti-counterfeiting identification comprises the following steps:
A7 ) 按照出让防伪标识所有权状的内容生成一个背景图文;  A7) generate a background image according to the content of the ownership of the security mark;
B7)将出让所有权的编码加到所述出让防伪标识的编码上构成第一编码, 并将所述第一编码 嵌入到所述所有权状的背景图文中;  B7) adding a code of the transfer ownership to the code of the transfer security mark to form a first code, and embedding the first code into the background image of the ownership;
C7) 在出让方的第一标识解读器上显示所述第一编码所嵌入的所有权状;  C7) displaying the ownership embedded in the first code on the first identifier reader of the transferor;
D7) 接收方用第二标识解读器扫描所述出让方的所述第一标识解读器上的所有权状; D7) the receiver scans the ownership of the first identifier reader of the transferor with a second identifier reader;
E7) 接收方在所述第二标识解读器上确认所有权的变更; E7) the receiving party confirms the change of ownership on the second identifier reader;
F7) 系统更新数据库记录, 将防伪标识的所有权从所述出让方转给所述接收方。  F7) The system updates the database record, transferring ownership of the anti-counterfeit identification from the transferor to the recipient.
PCT/CN2014/073140 2013-03-13 2014-03-10 Anti-counterfeiting system and method thereof for tag forming, embedding, interpreting, authenticating and ownership changing WO2014139386A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310080005.5A CN103208067B (en) 2013-03-13 2013-03-13 Antiforge system and the formation of label thereof, embed, understand, differentiate and ownership change method
CN201310080005.5 2013-03-13

Publications (1)

Publication Number Publication Date
WO2014139386A1 true WO2014139386A1 (en) 2014-09-18

Family

ID=48755284

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/073140 WO2014139386A1 (en) 2013-03-13 2014-03-10 Anti-counterfeiting system and method thereof for tag forming, embedding, interpreting, authenticating and ownership changing

Country Status (2)

Country Link
CN (1) CN103208067B (en)
WO (1) WO2014139386A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103208067B (en) * 2013-03-13 2016-08-10 张小北 Antiforge system and the formation of label thereof, embed, understand, differentiate and ownership change method
CN104464504B (en) * 2013-09-16 2017-11-21 深圳市同盛绿色科技有限公司 Antifalsification label, the manufacture method of antifalsification label and method for anti-counterfeit
CN104463291B (en) * 2013-09-16 2018-06-05 深圳市同盛绿色科技有限公司 Method for anti-counterfeit and mobile equipment
CN103778542A (en) * 2014-01-06 2014-05-07 立德高科(北京)数码科技有限责任公司 Bill anti-fake system based on network support and management platform thereof
CN103927668B (en) * 2014-04-14 2017-10-24 立德高科(北京)数码科技有限责任公司 Based on shooting picture and method of the picture comparing result to distinguish authenticity of products that prestore
CN104182882B (en) * 2014-08-05 2018-01-12 付强 A kind of product digital watermark anti-fake anti-channel conflict information and its application process
CN104376350B (en) * 2014-11-25 2017-09-19 张延坦 A kind of false proof device on commodity
CN104916223A (en) * 2015-06-25 2015-09-16 李峰 Color-changing anti-counterfeiting structure and anti-counterfeiting method thereof
CN107507009A (en) * 2017-08-11 2017-12-22 中丰网络科技(武汉)有限公司 A kind of Antiforge recognizing method and system
CN107886342A (en) * 2017-11-30 2018-04-06 广东正迪科技股份有限公司 Anti-forge inquiring method and its system based on random pattern anti-false sign
EP3564846A1 (en) * 2018-04-30 2019-11-06 Merck Patent GmbH Methods and systems for automatic object recognition and authentication
DE112019007001T5 (en) * 2019-08-07 2022-03-10 Robert Bosch Gmbh Anti-counterfeiting product with random microdot features and method of manufacture and verification thereof
WO2021102770A1 (en) * 2019-11-28 2021-06-03 罗伯特·博世有限公司 Method and device for verifying authenticity of product
CN115860033B (en) * 2023-01-31 2023-05-16 北京微点科学技术有限公司 Anti-counterfeiting method and device for color partition micro-point code mark capable of classifying and identifying counterfeiting

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256398B1 (en) * 1998-08-22 2001-07-03 Kenneth H. P. Chang Encoding and decoding a message within an image
CN1417710A (en) * 2001-11-10 2003-05-14 付振洲 Commodity, Bill and certificate anti-fake method and system and special transceiver
CN1469294A (en) * 2002-07-01 2004-01-21 张小北 Printing user interface system and its application
CN1949242A (en) * 2006-10-31 2007-04-18 黄正道 Pseudo proof method using cryptical symbol, identifying apparatus and cryptical symbol tag
CN101980271A (en) * 2010-10-15 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity anti-counterfeiting system and method, and anti-counterfeiting electronic device
CN103208067A (en) * 2013-03-13 2013-07-17 张小北 Anti-counterfeiting system and label forming method, embedding method, reading method, identifying method and ownership changing method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872575A (en) * 2009-04-24 2010-10-27 劳国华 Counterfeit invisible general commodity bar code or dot matrix and checking method by using mobile phone
CN102842053B (en) * 2012-08-21 2015-08-19 吉林省通程科技有限公司 A kind of false proof figure code label and manufacture method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256398B1 (en) * 1998-08-22 2001-07-03 Kenneth H. P. Chang Encoding and decoding a message within an image
CN1417710A (en) * 2001-11-10 2003-05-14 付振洲 Commodity, Bill and certificate anti-fake method and system and special transceiver
CN1469294A (en) * 2002-07-01 2004-01-21 张小北 Printing user interface system and its application
CN1949242A (en) * 2006-10-31 2007-04-18 黄正道 Pseudo proof method using cryptical symbol, identifying apparatus and cryptical symbol tag
CN101980271A (en) * 2010-10-15 2011-02-23 银川市高新电子应用技术研究所 Radio frequency identification technology-based commodity anti-counterfeiting system and method, and anti-counterfeiting electronic device
CN103208067A (en) * 2013-03-13 2013-07-17 张小北 Anti-counterfeiting system and label forming method, embedding method, reading method, identifying method and ownership changing method thereof

Also Published As

Publication number Publication date
CN103208067A (en) 2013-07-17
CN103208067B (en) 2016-08-10

Similar Documents

Publication Publication Date Title
WO2014139386A1 (en) Anti-counterfeiting system and method thereof for tag forming, embedding, interpreting, authenticating and ownership changing
US8542871B2 (en) Brand protection and product authentication using portable devices
CN101501680B (en) Method and system for deterring product counterfeiting, diversion and piracy
US20210206193A1 (en) Embedded variable line patterns
US11037213B2 (en) Embedding security information in an image
CN100576942C (en) A kind of mobile antifogery method and system thereof based on mobile phone
US20040049401A1 (en) Security methods employing drivers licenses and other documents
US20140095398A1 (en) Double ID Anti-Counterfeit Method and System
US8090952B2 (en) Counterfeit prevention system based on random positioning on a pattern
US20190347888A1 (en) Document authentication system
US20060020803A1 (en) Systems and methods for authentication of items or documents
CN109165958A (en) A kind of commodity traceability system and method based on image information safe practice
US8243930B2 (en) Counterfeit prevention system based on random processes and cryptography
JP3960617B2 (en) Variable seal stamp and seal verification system
TW201405503A (en) Random embossment tactile feeling counterfeiting method
CN105187422B (en) Rely on the anti-phishing website identification method and system on latent image coding techniques
US11279164B1 (en) Length-modulated screening lines and line codes
TW202105296A (en) Anti-counterfeiting method and system for seal and stamp wherein the seal and stamp anti-counterfeiting system includes a client communication device and a bank server system to ensure data integrity
TWI518598B (en) A barcode tamper-proofing system and method thereof
CN108694429B (en) Two-dimensional code generation method and identification method
KR101298224B1 (en) Authentication method using 2-dimensional code
TWI294595B (en) Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service
CN106156814A (en) A kind of utilize universe code to carry out license application product is false proof and the system of discrimination and using method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14764385

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC , EPO FORM 1205A DATED 04.02.16

122 Ep: pct application non-entry in european phase

Ref document number: 14764385

Country of ref document: EP

Kind code of ref document: A1