WO2015035704A1 - 光学识别方法及移动设备 - Google Patents
光学识别方法及移动设备 Download PDFInfo
- Publication number
- WO2015035704A1 WO2015035704A1 PCT/CN2013/086959 CN2013086959W WO2015035704A1 WO 2015035704 A1 WO2015035704 A1 WO 2015035704A1 CN 2013086959 W CN2013086959 W CN 2013086959W WO 2015035704 A1 WO2015035704 A1 WO 2015035704A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- identifier
- optical scanning
- mobile device
- scanning
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00838—Preventing unauthorised reproduction
- H04N1/0084—Determining the necessity for prevention
- H04N1/00843—Determining the necessity for prevention based on recognising a copy prohibited original, e.g. a banknote
- H04N1/00846—Determining the necessity for prevention based on recognising a copy prohibited original, e.g. a banknote based on detection of a dedicated indication, e.g. marks or the like
Definitions
- the present invention relates to the field of anti-counterfeiting technology, and in particular to an optical recognition method and a mobile device.
- Anti-counterfeiting is an important proposition in the trading of goods.
- it is usually necessary to first scan the anti-counterfeit label for anti-counterfeiting information.
- it is a progressive scan line by line. Even if the scanned area is not the destination area, the scanning speed is slow, which increases the load of the scanning device.
- the technical problem to be solved by the present invention is to provide an optical recognition method and a mobile device capable of quickly scanning and identifying an optical scanning area and reducing the load of the scanning device.
- the present invention provides an optical recognition method comprising: performing progressive optical scanning on a first optical scanning area in a row or column direction, and scanning only the first scanning point in front of each line; a first identifier, optically identifying a predetermined range of second optical scanning regions subsequent to the first identifier; or, when scanning the first identifier, a second optical scan subsequent to the first identifier
- the area is optically recognized, and when the second identifier is scanned, optical recognition of the second optical scanning area is stopped; wherein the first identifier is disposed in front of the second optical scanning area, The second identifier is disposed behind the second optical scanning area, and the second optical scanning area is an anti-counterfeit label.
- the first identifier is disposed at the forefront of the scanning direction in the second optical scanning area.
- the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
- the present invention provides an optical recognition method, comprising: optically scanning a first optical scanning area; and scanning a first identifier, a second predetermined range behind the first identifier Optically identifying the optical scanning area; or optically identifying the second optical scanning area behind the first identifier when scanning the first identifier, and stopping the second when scanning the second identifier
- the optical scanning area is optically recognized; wherein the first identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area.
- the step of optically scanning the first optical scanning area comprises: performing progressive optical scanning on the first optical scanning area in a row or column direction, and scanning only the first scanning point in front of each line.
- the first identifier is disposed at the forefront of the scanning direction in the second optical scanning area.
- the second optical scanning area is an anti-counterfeit label.
- the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
- the mobile terminal includes: a scanning module, configured to perform optical scanning on the first optical scanning area; and an optical identification module, when scanning the first identifier, Optically identifying a predetermined range of second optical scanning regions subsequent to the first identifier; or for optically identifying a second optical scanning region subsequent to the first identifier when scanning the first identifier Stopping optically recognizing the second optical scanning area when scanning the second identifier; wherein the first identifier is disposed in front of the second optical scanning area, and the second identifier is set Behind the second optical scanning area.
- the scanning module is specifically configured to perform progressive optical scanning on the first optical scanning area in a row direction or a column direction, and scan only the first scanning point in front of each line.
- the first identifier is disposed at the forefront of the scanning direction in the second optical scanning area.
- the second optical scanning area is an anti-counterfeit label.
- the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
- the present invention optically scans the first optical scanning area; optically identifies a predetermined range of the second optical scanning area behind the first identifier when scanning the first identifier; or scans
- the first identifier is obtained, the second optical scanning area behind the first identifier is optically recognized, and when the second identifier is scanned, the second optical scanning area is optically recognized; since the first identifier is set to In front of the second optical scanning area, the second identifier is disposed behind the second optical scanning area. In this way, rapid scanning recognition can be performed, and the load of the scanning device can be reduced.
- FIG. 1 is a flow chart of an embodiment of an anti-counterfeiting method of the present invention
- FIG. 2 is a flow chart of an embodiment of an optical recognition method of the present invention
- FIG. 3 is a flow chart of another embodiment of the optical recognition method of the present invention.
- FIG. 4 is a schematic structural view of an embodiment of an anti-counterfeit label of the present invention.
- FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
- FIG. 6 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
- FIG. 7 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
- FIG. 9 is a flow chart of an embodiment of a method for manufacturing an anti-counterfeit label of the present invention.
- FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
- FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
- FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention.
- FIG. 1 is a flowchart of an embodiment of an anti-counterfeiting method according to the present invention, including:
- Step S101 The first data that uniquely identifies the corresponding object is saved in the authentication server.
- the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
- Step S102 The mobile device acquires first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
- the anti-counterfeiting information is used to uniquely identify the corresponding object, and may indicate that the object is not a counterfeit product.
- the mobile device After the mobile device identifies the anti-counterfeiting information, the first data is obtained, and the first data can uniquely identify the corresponding object.
- the mobile device can use the built-in camera to identify the anti-counterfeiting information.
- the step S102 specifically includes: capturing, by using a mobile device with a camera, an image of the identifier or the anti-counterfeit tag located on the object, and performing optical recognition to obtain the first One data.
- the image of the identification or security label on the object includes, but is not limited to, text, characters, combinations of text and characters, two-dimensional codes or barcodes, and the like.
- the image of the anti-counterfeit label on the object is collected by a mobile device with a camera, wherein the anti-counterfeit label comprises a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles to the base layer, and drying and solidifying, the drip layer At least the number and location of the particles in the particle are random.
- Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
- the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
- the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
- A includes: scanning an image of the security label on the object with a mobile device with a camera; collecting an image of the security label behind the first identifier when scanning the first identifier; scanning the second identifier At the same time, the acquisition of the image behind the second identifier is stopped, wherein the first identifier is disposed in front of the security label, and the second identifier is disposed behind the security label.
- A includes: scanning, by using a mobile device with a camera, an image of the security label on the object; and when scanning the first identifier, acquiring an image of the security label of the preset range behind the first identifier, wherein, An identifier is placed in front of the security label.
- the image of the security label of the preset range behind the first identifier may be acquired.
- A includes: collecting an image of the security label of the preset range in front of the terminator when the terminator is scanned (ie, the location where the second identifier is located), wherein the terminator is disposed after the security tag.
- Setting the first identifier and the second identifier in front of and behind the security label, or setting the first identifier in front of the security label, can improve the speed of scanning recognition and reduce the load of the mobile device when performing identification.
- the number and position of the particles in the drip layer are optically identified, and the number and position of the particles in the identified drip layer are sequentially combined into the first data.
- the format of the first data is defined by a predetermined rule.
- the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
- the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
- the rule of the format of the first data is not limited to the above manner, and is not limited herein.
- B specifically: optically recognizing the number, position and color of the particles in the drip layer, and identifying the drip film
- the number, position and color of the particles in the layer are sequentially combined into the first data, wherein all the particles in the drip layer are at least one color, and if the color of the particles is two or more, the distribution of the colors is also random. of.
- the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
- Step S103 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
- the second data is a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
- IMSI International Mobile Subscriber Identity
- IMEI International Mobile Equipment Identity
- the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
- the second data includes a predetermined number of digits in the number of the mobile device, an International Mobile Subscriber Identity (IMSI) or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI. Data that is unique to the mobile device can be obtained, and the privacy of the user can be protected. For example, the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
- the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
- the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
- the scanning time is 10:15 on May 20, 2013, the location is Beijing
- the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
- the second data is 1305201015beijing.
- the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
- the code of the predetermined number of bits in the number of the mobile device, the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity (IMEI), and the time data of the mobile device's local scanning may be moved.
- the location data scanned by the device, or the combined data of the time data scanned by the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
- Step S104 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
- the results are recorded in the database to verify the authenticity when verification is required.
- the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
- the first data is 1234
- the second data is 5678
- the mapping data ABCD of the first data and the mapping data of the second data are EFGH
- the mapping data in which the first data and the second data are combined is ABCDEFGH.
- the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
- the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
- the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
- Step S105 The mobile device receives the authentication result from the authentication server.
- the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
- the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
- the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
- the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
- the verification result is a real label
- the first data obtained this time is attached 01021548498.
- the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
- the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or
- the mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data.
- the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
- the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
- the second data obtained by the mobile device itself is 1305301305beijing
- the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
- the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
- the authentication server does not send the second data, it indicates that the product is the first verification
- the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
- the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
- the authentication server sends the authentication result to the mobile device.
- the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
- the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
- step S102 when the mobile device acquires the identification of the anti-counterfeiting information, an optical identification method is involved.
- FIG. 2 and FIG. 3 are flowcharts of two embodiments of the optical identification method of the present invention, including:
- Step S201 optically scanning the first optical scanning area.
- the first identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area.
- the step S201 specifically includes: performing a progressive optical scan on the first optical scanning area according to the row direction, and scanning only the first scanning point in the previous row.
- the first optical scanning area is subjected to progressive optical scanning in a column direction, and each line scans only the first scanning point.
- the first identifier is disposed at the forefront of the scanning direction in the second optical scanning area.
- the scanning method is that each line sweeps from the head to the tail, and the non-optical scanning area also takes a lot of time during the scanning, and also increases the load of the scanning device. In the above manner, the purpose of fast scan recognition can be achieved, and the load of the scanning device is reduced.
- Step 202a and step S202b are two different scanning recognition modes, and one of them may be selected.
- Step S202a optically identifying a predetermined range of the second optical scanning area behind the first identifier when the first identifier is scanned.
- the first identifier When the first identifier is set only in front of the second optical scanning area, only the second optical scanning area of the preset range behind the first identifier can be optically identified.
- Step S202b When the first identifier is scanned, the second optical scanning area behind the first identifier is optically recognized, and when the second identifier is scanned, the second optical scanning area is stopped from being optically recognized.
- first identifier and the second identifier are respectively disposed in front of and behind the second optical scanning area, only the second optical scanning area between the first identifier and the second identifier is optically identified.
- the second optical scanning area is an anti-counterfeit label.
- the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
- Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
- the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
- the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
- step S202b may also be: optically identifying a predetermined range of second optical scanning regions preceding the terminator when scanning the terminator (ie, the location where the second identifier is located).
- the terminator When the terminator is set only after the second optical scanning area, only the second optical scanning area of the preset range in front of the terminator can be optically recognized.
- Embodiments of the present invention perform optical scanning on a first optical scanning area; optically identifying a predetermined range of second optical scanning areas behind the first identifier when scanning the first identifier; or scanning to the first And an identifier, the second optical scanning area behind the first identifier is optically recognized, and when the second identifier is scanned, optical recognition of the second optical scanning area is stopped; wherein the first An identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area. Since the first identifier and the second identifier are set or only the first identifier is set, the identified starting position is identified. In this way, scanning and identification can be quickly performed, reducing the load on the scanning device.
- step S102 if the image of the security label located on the object is collected by the mobile device, the anti-counterfeit label of the present invention shown in the following figure, the anti-counterfeiting method related to the anti-counterfeit label, and the manufacturing method of the anti-counterfeit label are also involved here. .
- FIG. 4 is a schematic structural diagram of an anti-counterfeit label according to an embodiment of the present invention.
- the anti-counterfeit label 10 includes a base layer 101 and a drip layer 102.
- the drip layer 102 is composed of a colloid 1022 including a plurality of particles 1021. After being dispersed into the base layer 101, it is formed by drying and solidification, wherein at least the number and position of the particles 1021 in the drip film layer 102 are random.
- Anti-counterfeit label 10 also known as anti-counterfeit label or anti-counterfeit trademark, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachment of the subject matter (such as merchandise listing, business card and security card), with anti-counterfeiting The identity of the role.
- the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
- the drip film in the anti-counterfeit label comprises a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
- FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
- the anti-counterfeit label 20 includes a base layer 201 and a drip layer 202.
- the drip layer 202 is a colloid comprising a plurality of particles 2021. After 2022 is dispersed into the base layer 201, it is formed by drying and solidification, wherein at least the number and position of the particles 2021 in the drip film layer 202 are random.
- the base layer 201 is printed with a coordinate system 2011, a random number of particles 2021 are randomly distributed in the coordinate system 2011, and a droplet layer 202 is first recorded after the formation of the coordinates of all the particles 2021 thereof, and a coordinate sequence forming a predetermined length is recorded in the database. Verify the authenticity when it is to be verified. By printing the coordinate system on the base layer, the anti-counterfeiting accuracy of the security label can be increased.
- the particle when recording or identifying the coordinates of a particle, if the coordinates of the particle are not easily determined, the particle may be ignored, or the coordinate of the particle may be determined by an algorithm for determining the coordinate. If the number of particles in the drip layer is large, and the number of characters of the particle is combined more than the preset number of characters, the characters after the preset number of characters are ignored.
- all the particles 2021 in one drip film layer 202 have at least one color, and if the color is two or more, the color distribution is also random. As shown in FIG. 5, there are two color particles, which are red particles 20211 and yellow particles 20212, respectively.
- the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm.
- a common scanning device can distinguish individual particles; the other case is the diameter of the particles.
- ordinary scanning devices cannot distinguish individual particles, and special scanning equipment with tools such as magnifying glasses or low power microscopes is required. Resolve individual particles.
- the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
- the colloid in the anti-counterfeit label may be transparent or not transparent. If it is not transparent, it has special requirements for particles or scanning equipment, such as scanning equipment with X-ray irradiation function, or particle belt. There is some kind of marker, and the scanning device is a scanning device with the identification of the marker.
- the security label 30 further includes a first identifier 303 and a second identifier 304.
- the first identifier 303 and the second identifier 304 are disposed on the base layer 301.
- An identifier 304 is used to identify the starting position of the drip layer 302, and a second identifier 304 is used to identify the end position of the drip layer 302.
- the first identifier and the second identifier indicate the starting position and the ending position of the drip layer. In this way, when the first identifier is not scanned, the data may not be collected, and when the second identifier is scanned The data can be terminated, thereby increasing the speed of scanning and collecting the data of the security label and reducing the load on the scanning device.
- the anti-counterfeit label in the above FIG. 4 to FIG. 7 may further include a coating covering the base layer and the uppermost layer of the drip film layer, and the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
- the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
- FIG. 8 is a flowchart of another embodiment of the anti-counterfeiting method of the present invention.
- the embodiment is a flowchart of an anti-counterfeiting method when the anti-counterfeit tag is the anti-counterfeit tag described in FIG. 4 to FIG. 7 , and includes:
- Step S301 Scan and collect an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer are at least The quantity and location are random.
- Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
- the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
- the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
- the step of scanning and collecting the image of the security label includes: collecting an image of the security label behind the first identifier when scanning the first identifier; and stopping collecting the second identifier after scanning the second identifier
- the image wherein the first identifier and the second identifier are disposed on the base layer, the first identifier is used to identify a starting position of the drip layer, and the second identifier is used to identify a termination position of the drip layer.
- the step of scanning and collecting the image of the security label includes: collecting an image of the security label of the preset range after the first identifier when the first identifier is scanned, wherein the first identifier is set on the base layer, first The identifier is used to identify the starting position of the drip layer.
- the first identifier When the first identifier is set only in front of the image of the security label, only the image of the security label of the preset range behind the first identifier may be collected.
- Step S302 Identifying the number and position of the particles in the drip layer to obtain verification data.
- the step S302 specifically includes: identifying the number, position, and color of the particles in the drip layer, wherein all the particles in the drip layer have at least one color, and if there are two or more colors, the color distribution is also random. of.
- the color of the particles is increased, and the distribution of the colors is also random. In this way, the difficulty of counterfeiting the security label is further increased, and the reliability of the security label is improved.
- the step S302 may specifically include the following content:
- C1 The number and position of the particles in the identified drip layer are sequentially combined into the first data.
- C2 one of a predetermined number of digits in the number of the mobile device generated when the first data is to be identified, a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), and a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI The two are combined into the second data.
- IMSI International Mobile Subscriber Identity
- IMEI International Mobile Equipment Identity
- C3 The first data and the second data are sequentially combined into the final verification data.
- the first data basically represents the uniqueness of the security label
- the second data is a predetermined number of digits in the number of the mobile device generated when the first data is identified, the international mobile user
- the combination of the code of the predetermined number of bits in the identification code IMSI and the code of the predetermined number of bits in the international mobile device identification code IMEI further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting. If the second data is generated by identifying at least the time data and the location data is sequentially combined, this further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting.
- Step S303 Find the correct result of the matching verification data in the database. If the correct result of the matching is found, it is determined that the anti-counterfeit label is a real label, otherwise it is determined to be a false label, wherein the correct result is all the particles in the falling layer After the coordinates are dispersed, a coordinate sequence of a predetermined length is formed as a correct result to be recorded in the database to verify the authenticity when to be verified.
- a coordinate sequence forming a predetermined length is recorded as a correct result in the database, and the verification data is obtained by identifying the number and position of the particles in the drip layer, and thus, in the database If the matching verification data can be found, the anti-counterfeit label is a real label, otherwise it is a fake label. If the verification data includes the combined data of the first data and the second data, and the correct result of the matching verification data is searched according to the first data, if the correct result of the matching is found, the authentication result is determined that the security label is a real label, Otherwise it is judged to be a false label.
- Embodiments of the present invention scan and collect images of security labels, identify the number and location of particles in the drop layer to obtain verification data, and find the correct results in the database that match the verification data. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
- FIG. 9 is a flowchart of an embodiment of a method for manufacturing an anti-counterfeit label according to the present invention, including:
- Step S401 adding a plurality of particles to the colloid.
- the materials of the particles herein include, but are not limited to, plastics, metals, ceramics, and the like, and are not limited herein.
- Colloid also known as colloidal dispersion, is a type of dispersion system in which the diameter of the dispersed particles is between the crude dispersion system and the solution. It may be transparent or non-transparent, and is not limited.
- step S401 comprises: adding a plurality of particles to the transparent colloid and stirring.
- Step S402 Dispersing the colloid containing the particles onto the base layer to form a film containing the particles.
- the step of dispersing the colloid containing the particles onto the base layer comprises: dropping, adding or spraying the colloid containing the particles onto the base layer.
- the step of forming the film containing the particles comprises: printing a coordinate system on the surface of the substrate, the film being in a printing coordinate system, wherein a random number of particles are randomly distributed in the coordinate system.
- Printing the coordinate system on the surface of the base layer can better identify the random position coordinates of a random number of particles, and improve the anti-counterfeiting precision of the anti-counterfeit label.
- the step of printing a coordinate system on the surface of the base layer includes: printing a coordinate system, a first identifier, and a second identifier on the surface of the base layer, wherein the first identifier is used to identify a starting position of the falling film layer, and the second identifier Used to identify the end position of the drip layer.
- the first identifier and the second identifier respectively identify the starting position and the ending position of the drip layer, which further clarifies the spatial extent of the drip layer.
- Step S403 The film is dried and solidified, wherein at least the number and position of the particles in the film are random.
- step S403 the method further includes:
- D1 Record the coordinates of all or a predetermined number of particles in the film, obtain a coordinate sequence of a predetermined length, and record it in a database to verify the authenticity when it is to be verified.
- the coating is covered on the base layer and at the top of the drip layer.
- the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
- the coating may be scraped off.
- a condition is that the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm, within which a conventional scanning device can resolve individual particles;
- the diameter of the particles is between 1 micrometer and 10 micrometers, for example 1 micrometer, 5 micrometers or 10 micrometers, in this range, ordinary scanning devices cannot distinguish individual particles, and need to use tools such as a magnifying glass or a low power microscope.
- Special scanning equipment is able to distinguish individual particles. For anti-counterfeiting labels, if it is necessary to distinguish the individual particles by means of special scanning equipment with tools, this will undoubtedly increase the difficulty of counterfeiting counterfeiting and further improve the reliability of anti-counterfeiting.
- the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
- Embodiments of the present invention add a plurality of particles to a colloid; disperse the colloid containing the particles onto the base layer to form a film containing the particles; and dry and solidify the film, wherein at least the number and position of the particles in the film are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
- the anti-counterfeiting method is as shown in FIG.
- FIG. 10 is a flowchart of still another embodiment of the anti-counterfeiting method of the present invention, including:
- Step S501 The first data that uniquely identifies the corresponding object is saved in the authentication server.
- the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
- Step S502 The mobile device scans and collects an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer At least its number and location are random.
- Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
- the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
- the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
- Step S502 includes: collecting an image of the security label behind the first identifier when scanning the first identifier; and stopping collecting the image behind the second identifier when scanning the second identifier, wherein the first identifier is set In front of the security label, the second identifier is placed behind the security label.
- step S502 includes: collecting an image of a security label of a preset range behind the first identifier when the first identifier is scanned, wherein the first identifier is disposed in front of the security label.
- the first identifier When the first identifier is set only in front of the image of the security label, only the image of the security label of the preset range behind the first identifier may be collected.
- step S502 includes: collecting an image of the security label of the preset range in front of the terminator when the terminator is located (ie, the location where the second identifier is located), wherein the terminator is disposed after the security tag.
- Step S503 Identify the number and position of the particles in the drip layer, and combine the number and position of the particles in the identified drip layer into the first data in order.
- the format of the first data is defined by a predetermined rule.
- the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
- the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
- the rule of the format of the first data is not limited to the above manner, and is not limited herein.
- Step S503 specifically includes: identifying the number, position, and color of the particles in the drip layer, and sequentially combining the number, position, and color of the particles in the identified drip layer into the first data, wherein the drip layer is The color of all particles is at least one. If the color of the particles is two or more, the distribution of colors is also random.
- the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
- Step S504 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
- the second data is a number of a predetermined number of bits in the number of the mobile device, or a code IMSI of a predetermined number of bits in the International Mobile Subscriber Identity, or one of codes of a predetermined number of bits in the International Mobile Equipment Identity IMEI .
- the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
- the second data comprises a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity IMEI
- the code for the predetermined number of bits so that both the uniqueness of the mobile device data and the privacy of the user can be protected.
- the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
- the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
- the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
- the scanning time is 10:15 on May 20, 2013, the location is Beijing
- the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
- the second data is 1305201015beijing.
- the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
- the predetermined number of digits in the number of the mobile device may be associated with the mobile device.
- the combined time data of the scanned time data, the location data scanned by the mobile device, or the combined time data of the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
- Step S505 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct. The results are recorded in the database to verify the authenticity when verification is required.
- the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
- the first data is 1234
- the second data is 5678
- the mapping data ABCD of the first data and the mapping data of the second data are EFGH
- the mapping data in which the first data and the second data are combined is ABCDEFGH.
- the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
- the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
- the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
- Step S506 The mobile device receives the authentication result from the authentication server.
- the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
- the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
- the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
- the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
- the verification result is a real label
- the first data obtained this time is attached 01021548498.
- the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
- the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or
- the mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data.
- the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
- the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
- the second data obtained by the mobile device itself is 1305301305beijing
- the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
- the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
- the authentication server does not send the second data, it indicates that the product is the first verification
- the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
- the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
- the authentication server sends the authentication result to the mobile device.
- the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
- the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
- a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
- FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
- the mobile device includes: a scan acquisition module 11 , a first data obtaining module 12 , a second data obtaining module 13 , a sending module 14 , and a receiving module 15 .
- the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG.
- the scan acquisition module 11 is configured to scan and collect an image of the security label.
- the anti-counterfeit label includes a base layer and a drip layer.
- the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying. At least the number and location of the particles are random.
- the scan collection module 11 is further configured to: when scanning the first identifier, collect an image of the security label behind the first identifier; and when scanning the second identifier, stop collecting the image behind the second identifier, where The first identifier is placed in front of the security label and the second identifier is placed behind the security label.
- the scan collection module 11 is further configured to: when scanning the first identifier, collect an image of the anti-counterfeit label of the preset range behind the first identifier, where the first identifier is disposed in front of the anti-counterfeit label.
- the first data obtaining module 12 is configured to identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
- the first data obtaining module 12 is specifically configured to identify the number, position, and color of the particles in the drip layer, and combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
- the second data obtaining module 13 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
- the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
- IMSI International Mobile Subscriber Identity
- IMEI International Mobile Equipment Identity
- the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
- the sending module 14 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
- the results are recorded in the database to verify the authenticity when verification is required.
- the receiving module 15 is configured to receive the authentication result from the authentication server.
- the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
- a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
- FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
- the mobile device includes: a first data obtaining module 21, a second data obtaining module 22, a sending module 23, and a receiving module 24.
- the mobile device of this embodiment may perform step S102 to step S105 in the method flow shown in FIG. 1 .
- the first data obtaining module 21 is configured to acquire first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
- the first data obtaining module 21 is specifically configured to collect an image of the identification or anti-counterfeit label located on the object by using the mobile device with the camera, and perform optical recognition to obtain the first data.
- Identification or security labels include, but are not limited to, text, or characters, or a combination of text and characters, or a two-dimensional code or barcode.
- the first data obtaining module 21 includes: a third collecting unit and a first data obtaining unit.
- the third collecting unit is configured to collect an image of the anti-counterfeit label on the object by using a mobile device with a camera, wherein the anti-counterfeiting label comprises a base layer and a drip layer, and the drip layer is dispersed and solidified by a colloid containing a plurality of particles to the base layer. Formed, at least the number and location of the particles in the drip layer are random.
- the first data obtaining unit is configured to optically identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
- the first data obtaining unit is specifically configured to optically identify the number, position, and color of the particles in the drip layer, and sequentially combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
- the first data obtaining module 21 further includes a first collecting unit, configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier The image of the security label is followed by the image; after scanning the second identifier, the image behind the second identifier is stopped, wherein the first identifier is disposed in front of the security label, and the second identifier is disposed behind the security label.
- a first collecting unit configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier The image of the security label is followed by the image; after scanning the second identifier, the image behind the second identifier is stopped, wherein the first identifier is disposed in front of the security label, and the second identifier is disposed behind the security label.
- the first data obtaining module 21 further includes a second collecting unit, configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier An image of a security label of a preset range followed by a first identifier disposed in front of the security label.
- a second collecting unit configured to scan an image of the security label on the object with the mobile device with the camera; and collect the first identifier when scanning the first identifier An image of a security label of a preset range followed by a first identifier disposed in front of the security label.
- the second data obtaining module 22 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
- the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or one of the codes of the predetermined number of bits in the International Mobile Equipment Identity IMEI.
- the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
- the sending module 23 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
- the results are recorded in the database to verify the authenticity when verification is required.
- the receiving module 24 is configured to receive the authentication result from the authentication server.
- the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
- FIG. 13 is a schematic structural diagram of two embodiments of a mobile device according to the present invention.
- the mobile device includes: a scanning module 31 and an optical identification module 32.
- the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG. 2 and FIG.
- the scanning module 31 is configured to optically scan the first optical scanning area.
- the first identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area.
- the scanning module 31 is specifically configured to perform progressive optical scanning on the first optical scanning area in a row direction, and scan only the first scanning point in front of each line.
- the scanning module 31 is further configured to perform progressive optical scanning of the first optical scanning area in a column direction, and scan only the first scanning point in front of each line.
- the first identifier is disposed at the forefront of the scanning direction in the second optical scanning area.
- the optical identification module 32 is configured to optically identify a predetermined range of second optical scanning regions following the first identifier when the first identifier is scanned. Or for optically recognizing the second optical scanning area behind the first identifier when scanning the first identifier, and optically recognizing the second optical scanning area when scanning the second identifier.
- the second optical scanning area is an anti-counterfeit label.
- the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
- Embodiments of the present invention perform optical scanning on a first optical scanning area; optically identifying a predetermined range of second optical scanning areas behind the first identifier when scanning the first identifier; or scanning to the first And an identifier, the second optical scanning area behind the first identifier is optically recognized, and when the second identifier is scanned, optical recognition of the second optical scanning area is stopped; wherein the first An identifier is disposed in front of the second optical scanning area, and the second identifier is disposed behind the second optical scanning area. Since the first identifier and the second identifier are set or only the first identifier is set, the identified starting position is identified. In this way, scanning and identification can be quickly performed, reducing the load on the scanning device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Credit Cards Or The Like (AREA)
Abstract
一种光学识别方法,包括:对第一光学扫描区域进行光学扫描;在扫描到第一标识符时,对第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或扫描到第二识别标识符时,停止对第二光学扫描区域进行光学识别;其中,第一标识符设置于第二光学扫描区域的前面,第二标识符设置于第二光学扫描区域的后面。通过该识别方法能够进行快速识别,减少扫描设备的负荷。
Description
【技术领域】
本发明涉及防伪技术领域,特别是涉及一种光学识别方法及移动设备。
【背景技术】
在物品交易中,防伪是一个重要的命题。在验证防伪标签的时候,通常首先需要对防伪标签进行扫面采集防伪信息。通常情况下,在对防伪标签进行扫描时,是逐行逐行的扫描,即使所扫描的区域不是目的区域,这样扫描的速度很慢,也增加了扫描设备的负载。
【发明内容】
本发明主要解决的技术问题是提供一种光学识别方法及移动设备,能够快速扫描识别光学扫描区域,减小扫描设备的负荷。
为解决上述技术问题,本发明提供一种光学识别方法,包括:按照行向或列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点;在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面,所述第二光学扫描区域是防伪标签。
其中,所述第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
其中,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。
为解决上述技术问题,本发明提供一种光学识别方法,包括:对第一光学扫描区域进行光学扫描;在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面。
其中,所述对第一光学扫描区域进行光学扫描的步骤包括:按照行向或列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。
其中,所述第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
其中,所述第二光学扫描区域是防伪标签。
其中,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。
为解决上述技术问题,本发明提供一种移动设备,所述移动终端包括:扫描模块,用于对第一光学扫描区域进行光学扫描;光学识别模块,用于在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或用于在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面。
其中,所述扫描模块具体用于按照行向或列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。
其中,所述第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
其中,所述第二光学扫描区域是防伪标签。
其中,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。
区别现有技术的情况,本发明对第一光学扫描区域进行光学扫描;在扫描到第一标识符时,对第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或在扫描到第一标识符时,对第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对第二光学扫描区域进行光学识别;由于第一标识符设置于第二光学扫描区域的前面,第二标识符设置于第二光学扫描区域的后面,通过这种方式,能够进行快速扫描识别,减少扫描设备的负荷。
【附图说明】
图1是本发明防伪方法一实施方式的流程图;
图2是本发明光学识别方法一实施方式的流程图;
图3是本发明光学识别方法另一实施方式的流程图;
图4是本发明防伪标签一实施方式的结构示意图;
图5是本发明防伪标签另一实施方式的结构示意图;
图6是本发明防伪标签又一实施方式的结构示意图;
图7是本发明防伪标签又一实施方式的结构示意图;
图8是本发明防伪方法另一实施方式的流程图;
图9是本发明防伪标签制造方法一实施方式的流程图;
图10是本发明防伪方法又一实施方式的流程图;
图11是本发明移动设备一实施方式的结构示意图;
图12是本发明移动设备另一实施方式的结构示意图;
图13是本发明移动设备又一实施方式的结构示意图。
【具体实施方式】
下面结合附图和实施方式对本发明进行详细说明。
参阅图1,图1是本发明防伪方法一实施方式的流程图,包括:
步骤S101:将唯一标识相应物体的第一数据保存在鉴别服务器中。
唯一标识相应物体的第一数据即为该物体的防伪信息。由于第一数据的唯一性,根据第一数据可以辨别该物体的真假。
步骤S102:移动设备获取对防伪信息进行识别而得到的第一数据,第一数据用以唯一标识相应物体。
防伪信息用于唯一标识相应的物体,可以表明该物体不是假冒伪劣产品,移动设备对防伪信息进行识别后,获得第一数据,该第一数据即可以唯一标识相应物体。
其中,移动设备可以使用自带的摄像头对防伪信息进行识别,此时步骤S102具体包括:用带有摄像头的移动设备采集位于物体上的标识或防伪标签的图像,并进行光学识别,以获得第一数据。物体上的标识或防伪标签的图像包括但不限于文字、字符、文字和字符的组合、二维码或条形码等等。
其中,用带有摄像头的移动设备采集位于物体上的标识或防伪标签的图像,并进行光学识别,以获得第一数据的步骤具体包括:
A.用带有摄像头的移动设备采集物体上的防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。
其中,A包括:用带有摄像头的移动设备对物体上的防伪标签的图像进行扫描;在扫描到第一标识符时,采集第一标识符后面防伪标签的图像;在扫描到第二标识符时,停止采集第二标识符后面的图像,其中,第一标识符设置于防伪标签的前面,第二标识符设置于防伪标签的后面。
当防伪标签的前面和后面分别设置了第一标识符和第二标识符时,只是采集第一标识符和第二标识符之间的防伪标签的图像。
或者,A包括:用带有摄像头的移动设备对物体上的防伪标签的图像进行扫描;在扫描到第一标识符时,采集第一标识符后面预设范围的防伪标签的图像,其中,第一标识符设置于防伪标签的前面。
当只在防伪标签的前面设置第一标识符时,可以只采集第一标识符后面预设范围的防伪标签的图像。
又或者,A包括:在扫描到终止符(即上述第二标识符所在的位置)时,采集终止符前面预设范围的防伪标签的图像,其中,终止符设置于防伪标签的后面。
当只在防伪标签的后面设置终止符时,可以只采集终止符前面预设范围的防伪标签的图像。
在防伪标签的前面和后面设置第一标识符和第二标识符,或在防伪标签的前面设置第一标识符,可以提高扫描识别的速度,减少移动设备的在进行识别时的负载。
B.光学识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。
利用预定的规则对第一数据的格式进行定义,例如,第一数据要求是10个字符,如果规定坐标的位数是两位时,默认规定仅体现5个粒子的信息,字符不够的位数以零来补充,在滴膜层中有两个粒子,位置坐标分别是(0,2)和(5,3),按照横坐标由小到大的方向组合为0253(规定坐标的位数是两位)或00020503(规定坐标的位数是四位),则第一数据为0253000000或0002050300;按照纵坐标有大到小的方向组合为5302(规定坐标的位数是两位)或05030002(规定坐标的位数是四位),则第一数据为5302000000或0503000200。如果滴膜层中粒子的数量很多,粒子的位置坐标组合在一起后字符数多于10,则将10个字符以后的字符忽略,不计入第一数据中。当然,在实际应用中,第一数据的格式的规则的制定并不限于上述方式,在此不做限制。
其中,滴膜层中的粒子除了数量、位置的差别外,还有颜色的差别,即B具体可为:光学识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果粒子颜色为两种或两种以上,则颜色的分布也是随机的。
例如红色是01,黄色是02,黑色是03,绿色是04等等,如果上述的两个粒子一个是红色,一个是绿色,那么按照横坐标由小到大的方向且颜色有大到小的顺序进行排列组合,第一数据为0253010400(规定坐标的位数是两位)或者000205030104(规定坐标的位数是四位)。
步骤S103:在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。
第二数据是移动设备的号码中预定位数的号码,或者是国际移动用户识别码IMSI中预定位数的代码,或者是国际移动设备识别码IMEI中预定位数的代码。
移动用户的号码、国际移动用户识别码IMSI以及国际移动设备识别码IMEI对每个移动设备来说都是与移动设备本机关联的唯一性数据。为了保护移动用户的隐私,防止移动用户号码的泄密,第二数据包括移动设备的号码中预定位数号码、国际移动用户识别码IMSI或国际移动设备识别码IMEI中预定位数的代码,这样既可以获得移动设备唯一性的数据,又可以保护用户的隐私。例如,移动设备的号码是13777778888,预定后面的6位,则第二数据是778888。
或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。
移动设备本机扫描的时间数据和移动设备本机扫描的地点数据都是与移动设备本机关联的唯一性数据,因此,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或移动设备本机扫描的时间数据和扫描的地点数据的组合数据。例如,扫描的时间是2013年5月20日10点15分,地点是北京,第二数据可以是移动设备本机扫描的时间数据1305201015,或第二数据可以是移动设备本机扫描的地点数据beijing,如果第二数据是移动设备本机扫描的时间数据和扫描的地点数据的组合数据,那么第二数据是1305201015beijing。
需要说明的是,如果移动设备具备全球定位系统GPS导航功能,则移动设备本机扫描的地点是GPS定位导航的地点,如果移动设备不具备GPS导航功能或者没有开启GPS导航功能,则移动设备本机扫描的地点是该移动设备的号码归属地的地点。
当然,在实际应用中,也可以将移动设备的号码中预定位数号码、国际移动用户识别码IMSI或国际移动设备识别码IMEI中预定位数的代码与移动设备本机扫描的时间数据、移动设备本机扫描的地点数据、或移动设备本机扫描的时间数据和扫描的地点数据的组合数据进行组合以获得第二数据,在此不做限制。
步骤S104:移动设备向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。
验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,所谓映射数据是指与第一数据和第二数据对应的另外一组数据,例如:第一数据是1234,第二数据是5678,第一数据的映射数据ABCD和第二数据的映射数据是EFGH,那么第一数据和第二数据组合在一起的映射数据是ABCDEFGH。如果验证数据是第一数据和第二数据组合在一起的映射数据,在验证服务器中可以将该映射数据反映射重新获得第一数据和第二数据。当然,在实际应用中,如果第一数据的映射数据和第二数据的映射数据也分别是唯一的,那么也可以以第一数据的映射数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果。
移动设备向鉴别服务器发送验证数据,鉴别服务器根据第一数据查找匹配验证数据的正确结果,如果能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。
步骤S105:移动设备接收来自鉴别服务器的鉴别结果。
当鉴别服务器获得鉴别结果后,将该鉴别结果向移动设备发送,移动设备接收来自鉴别服务器的鉴别结果。例如,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据一致时,鉴别服务器向移动设备返回鉴别结果为真实标签,并返回本次的第一数据和第二数据,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据不一致时,鉴别服务器向移动设备返回鉴别结果为非真实标签,并返回本次的第一数据和第二数据,例如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888,当验证结果为真实标签,返回验证结果时附上本次获得的第一数据0121548498和第二数据788888,当验证结果为非真实标签,返回验证结果时也附上本次获得的第一数据0121548498和第二数据788888。
或者,鉴别服务器可以将第一次的验证数据保存在鉴别服务器中,在向移动设备发送鉴别结果的时候,将第一次验证保存的与该第一数据对应的验证数据中的第二数据或者第二数据的映射数据也向移动设备发送,如果没有保存的与该第一数据对应的验证数据,则不发送本次与该第一数据对应的验证数据的第二数据或者第二数据的映射数据。在鉴别结果是真实标签时,如果移动设备没有收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品是第一次验证,如果移动设备收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品不是第一次验证,曾经验证过。例如,移动设备本机本次获得的第二数据是1305301305beijing,来自鉴别服务器的第二数据是1305201015beijing,表明在2013年5月20日10点15分钟在北京已经有人验证过该产品,也可以说明该产品曾经被人使用过。又如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888时,如果鉴别服务器没有发送第二数据,表明该产品是第一次验证;如果鉴别服务器发送的第二数据是788888,表明用户使用该移动设备对该产品进行第二次验证;如果鉴别服务器发送的第二数据是785512,表明该产品在另外的移动设备上进行第二次验证,或者该产品曾经验证过,或该产品被人使用过。
当然,鉴别服务器以什么样的方式向移动设备发送鉴别结果,在实际应用中,可以根据实际情况进行确定,并不限于上述方式,在此不做限制。
本发明实施方式移动设备获取对防伪信息进行识别而得到的第一数据,所述第一数据用以唯一标识相应物体;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据是代表唯一性的数据,特别是第一数据用以唯一标识相应物体,通过这种方式,确保防伪信息的唯一性,仿造者无法复制,提高了防伪的可靠性。
在步骤S102中,移动设备获取对防伪信息进行识别时涉及一种光学识别方法,参阅图2和图3,图2和图3是本发明光学识别方法两个实施方式的流程图,包括:
步骤S201:对第一光学扫描区域进行光学扫描。
其中,第一标识符设置于第二光学扫描区域的前面,第二标识符设置于第二光学扫描区域的后面。
其中,步骤S201具体包括:按照行向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。或者,按照列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
在传统光学扫描方式中,扫描方法是每一行从头扫到尾,在扫面时那些非光学扫面区域也会花费很多时间,并且也会增加扫描设备的负载。通过上述方式,可以实现快速扫描识别的目的,并减少了扫描设备的负荷。
步骤202a和步骤S202b是两个不同的扫描识别方式,任选其中之一均可。
步骤S202a:在扫描到第一标识符时,对第一标识符后面的预定范围的第二光学扫描区域进行光学识别。
当只在第二光学扫描区域的前面设置第一标识符时,可以只对第一标识符后面预设范围的第二光学扫描区域进行光学识别。
步骤S202b:或在扫描到第一标识符时,对第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对第二光学扫描区域进行光学识别。
当第二光学扫描区域的前面和后面分别设置了第一标识符和第二标识符时,只是对第一标识符和第二标识符之间的第二光学扫描区域进行光学识别。
其中,第二光学扫描区域是防伪标签。防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。
当然,步骤S202b也可以是:在扫描到终止符(即上述第二标识符所在的位置)时,对所述终止符前面的预定范围的第二光学扫描区域进行光学识别。
当只在第二光学扫描区域的后面设置终止符时,可以只对终止符前面预设范围的第二光学扫描区域进行光学识别。
本发明实施方式对第一光学扫描区域进行光学扫描;在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面。由于设置了第一标识符和第二标识符或者只是设置第一标识符,标识了识别的起始位置,通过这种方式,可以快速扫描和识别,减少了扫描设备的负荷。
在步骤S102中,如果用移动设备采集位于物体之上的防伪标签的图像,那么这里也涉及到如下图所示的本发明防伪标签、与该防伪标签相关的防伪方法以及该防伪标签的制作方法。
参阅图4,图4是本发明防伪标签一实施方式的结构示意图,如图所示,该防伪标签10包括基层101以及滴膜层102,滴膜层102是由包含多个粒子1021的胶体1022分散到基层101后,干燥固化形成的,其中,滴膜层102中的粒子1021至少其数量以及位置是随机的。
防伪标签10又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。
本发明实施方式防伪标签中的滴膜层包含多个粒子,且粒子的数量和位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。
参阅图5,图5是本发明防伪标签另一实施方式的结构示意图,如图所示,该防伪标签20包括基层201以及滴膜层202,滴膜层202是由包含多个粒子2021的胶体2022分散到基层201后,干燥固化形成的,其中,滴膜层202中的粒子2021至少其数量以及位置是随机的。
基层201上印刷有坐标系2011,随机数量的粒子2021在坐标系2011中随机分布,一个滴膜层202在形成后其所有粒子2021的坐标首次记录,形成预定长度的坐标序列被记录于数据库中以待验证时查证真伪。通过在基层上印刷坐标系,可以增加防伪标签的防伪精度。
需要说明的是,在记录或识别粒子的坐标时,如果粒子的坐标不容易确定,可以忽略该粒子,也可以通过确定坐标的算法来确定该粒子的坐标。如果滴膜层中粒子的数量很多,粒子的坐标序列组合在一起后字符数多于预设字符数,则将预设字符数以后的字符忽略。
其中,一个滴膜层202中的所有粒子2021颜色至少为一种,如果颜色是两种或两种以上,则颜色的分布也是随机的。如图5所示,有两种颜色的粒子,分别是红色的粒子20211和黄色的粒子20212。
其中,一种情况是粒子的直径位于0.1毫米至1毫米之间,例如0.1毫米、0.5毫米或1毫米,在这个范围内,普通的扫描设备可以分辨各个粒子;另一种情况是粒子的直径位于1微米至10微米之间,例如1微米、5微米或10微米,在这个范围内,普通的扫描设备无法分辨各个粒子,需要借助带有工具例如放大镜或者低倍显微镜的特殊扫描设备才能够分辨各个粒子。对防伪标签来说,如果需要借助带有工具的特殊扫描设备才可以分辨各个粒子,那么这无疑更加增加了伪造者仿冒的难度,进一步提高了防伪的可靠性。当然,在实际应用中,粒子的直径并不限于上述0.1毫米至1毫米和1微米至10微米范围之内,例如2毫米、50微米等等。
需要说明的是,防伪标签中的胶体可以是透明的,也可以不是透明,如果不是透明的,对于粒子或扫面设备有特殊的要求,例如带有X光照射功能的扫描设备,或者粒子带有某种标记物,扫描设备是带有识别该标记物的扫描设备。
参阅图6和图7,在图6和图7中,防伪标签30还包括第一标识符303和第二标识符304,第一标识符303和第二标识符304设置于基层301上,第一标识符304用于标识滴膜层302的起始位置,第二标识符304用于标识滴膜层302的终止位置。
第一标识符和第二标识符标明了滴膜层的起始位置和终止位置,通过这种方式,在没有扫描到第一标识符时,可以不用采集数据,在扫描到第二标识符时,可以终止采集数据,从而提高扫描和采集防伪标签的数据的速度,并减少扫描设备的负荷。
需要说明的是,上述图4至图7中的防伪标签还可以包括覆盖在基层以及滴膜层最上面的涂层,该涂层将防伪标签的防伪信息覆盖,以保护防伪信息的暴露,在需要扫描防伪标签的防伪信息的时候,将涂层刮掉即可。
参阅图8,图8是本发明防伪方法另一实施方式的流程图,本实施方式是在防伪标签是图4至图7所述的防伪标签时防伪方法的流程图,包括:
步骤S301:扫描并采集防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。
其中,扫描并采集防伪标签的图像的步骤包括:在扫描到第一标识符时,采集第一标识符后面防伪标签的图像;在扫描到第二标识符时,停止采集第二标识符后面的图像,其中,第一标识符和第二标识符设置于基层上,第一标识符用于标识滴膜层的起始位置,第二标识符用于标识滴膜层的终止位置。
当防伪标签的图像的前面和后面分别设置了第一标识符和第二标识符时,只是对第一标识符和第二标识符之间的防伪标签的图像进行采集。
或者,扫描并采集防伪标签的图像的步骤包括:在扫描到第一标识符时,采集第一标识符后面预设范围的防伪标签的图像,其中,第一标识符设置于基层上,第一标识符用于标识滴膜层的起始位置。
当只在防伪标签的图像的前面设置第一标识符时,可以只对第一标识符后面预设范围的防伪标签的图像进行采集。
步骤S302:识别滴膜层中的粒子的数量以及位置而得到验证数据。
步骤S302具体包括:识别滴膜层中的粒子的数量、位置以及颜色,其中,滴膜层中的所有粒子颜色至少为一种,如果颜色有两种或两种以上,则颜色的分布也是随机的。
在粒子的数量和位置是随机分布的情况下,增加粒子的颜色,并且颜色的分布也是随机的,通过这种方式,更加增加了仿造防伪标签的难度,提高了防伪标签的可靠性。
其中,步骤S302具体还可以包括如下内容:
C1:将识别出来的滴膜层中的粒子的数量、位置按顺序组合成第一数据。
C2:将识别第一数据时所产生的移动设备的号码中预定位数的号码、国际移动用户识别码IMSI中预定位数的代码、国际移动设备识别码IMEI中预定位数的代码中的一种组合成第二数据。
或者C2:将识别第一数据时所产生的至少包括时间数据以及地点数据按顺序组合成第二数据。
C3:将第一数据和第二数据按顺序组合成最后的验证数据。
由于粒子的数量和位置是随机分布的,第一数据基本代表了防伪标签的唯一性,如果第二数据是识别第一数据时所产生的移动设备的号码中预定位数的号码、国际移动用户识别码IMSI中预定位数的代码、国际移动设备识别码IMEI中预定位数的代码中的一种组合生成的,这又进一步增加了验证数据的唯一性,提高防伪的可靠性。如果第二数据是识别第一数据时所产生的至少包括时间数据以及地点数据按顺序组合成的,这也进一步增加了验证数据的唯一性,提高防伪的可靠性。
步骤S303:在数据库中查找匹配验证数据的正确结果,若能够查找得到匹配的正确结果,则判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是滴膜层中的所有粒子的坐标在分散后,形成预定长度的坐标序列作为正确结果被记录于数据库中以待验证时查证真伪。
滴膜层中的所有粒子的坐标在分散后,形成预定长度的坐标序列作为正确结果被记录于数据库中,验证数据是识别滴膜层中的粒子的数量以及位置而得到,因此,在数据库中能够找到匹配验证数据的,则防伪标签是真实标签,否则为虚假标签。如果验证数据包括第一数据和第二数据在内的组合数据,根据第一数据查找匹配验证数据的正确结果,如果能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签。
本发明实施方式扫描并采集防伪标签的图像,识别滴膜层中的粒子的数量以及位置而得到验证数据;在数据库中查找匹配所述验证数据的正确结果。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。
参阅图9,图9是本发明防伪标签制造方法一实施方式的流程图,包括:
步骤S401:将多个粒子加入到胶体中。
此处的粒子的材料包括但不限于塑料、金属、陶瓷等等,在此不做限制。胶体又称胶状分散体,是一种分散质粒子直径介于粗分散体系和溶液之间的一类分散体系,可以是透明的,也可以是非透明的,不做限制。
其中,步骤S401包括:将多个粒子加入到透明胶体中并搅拌。
步骤S402:将含有粒子的胶体分散到基层上,形成含有粒子的薄膜。
其中,将含有粒子的胶体分散到基层上的步骤包括:将含有粒子的胶体滴落、添加或喷洒到基层上。
其中,形成含有粒子的薄膜的步骤之前包括:在基层表面印刷坐标系,薄膜位于印刷坐标系中,其中,随机数量的粒子在坐标系中随机分布。
在基层表面印刷坐标系可以更好的标识随机数量的粒子的随机位置坐标,提高防伪标签的防伪精度。
其中,在基层表面印刷坐标系的步骤包括:在基层表面印刷坐标系、第一标识符以及第二标识符,其中,第一标识符用于标识滴膜层的起始位置,第二标识符用于标识滴膜层的终止位置。
第一标识符和第二标识符分别标识滴膜层的起始位置和终止位置,这样更加明确了滴膜层的空间范围。
步骤S403:使薄膜干燥固化,其中,薄膜中的粒子至少其数量以及位置是随机的。
其中,步骤S403之后还包括:
D1:记录薄膜中全部或预定数量粒子的坐标,得到预定长度的坐标序列,并记录于数据库中以待验证时查证真伪。
D2:在基层以及滴膜层最上面覆盖涂层。该涂层将防伪标签的防伪信息覆盖,以保护防伪信息的暴露,在需要扫描防伪标签的防伪信息的时候,将涂层刮掉即可。
在本发明实施方式中,一种情况是粒子的直径位于0.1毫米至1毫米之间,例如0.1毫米、0.5毫米或1毫米,在这个范围内,普通的扫描设备可以分辨各个粒子;另一种情况是粒子的直径位于1微米至10微米之间,例如1微米、5微米或10微米,在这个范围内,普通的扫描设备无法分辨各个粒子,需要借助带有工具例如放大镜或者低倍显微镜的特殊扫描设备才能够分辨各个粒子。对防伪标签来说,如果需要借助带有工具的特殊扫描设备才可以分辨各个粒子,那么这无疑更加增加了伪造者仿冒的难度,进一步提高了防伪的可靠性。当然,在实际应用中,粒子的直径并不限于上述0.1毫米至1毫米和1微米至10微米范围之内,例如2毫米、50微米等等。
本发明实施方式将多个粒子加入到胶体中;将含有粒子的胶体分散到基层上,形成含有粒子的薄膜;使薄膜干燥固化,其中,薄膜中的粒子至少其数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。
在图1的防伪方法实施方式中,如果防伪信息是带有滴胶的防伪标签,则防伪方法如图10所示。
参见图10,图10是本发明防伪方法又一实施方式的流程图,包括:
步骤S501:将唯一标识相应物体的第一数据保存在鉴别服务器中。
唯一标识相应物体的第一数据即为该物体的防伪信息。由于第一数据的唯一性,根据第一数据可以辨别该物体的真假。
步骤S502:移动设备扫描并采集防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。
步骤S502包括:在扫描到第一标识符时,采集第一标识符后面防伪标签的图像;在扫描到第二标识符时,停止采集第二标识符后面的图像,其中,第一标识符设置于防伪标签的前面,第二标识符设置于防伪标签的后面。
当防伪标签的图像的前面和后面分别设置了第一标识符和第二标识符时,只是对第一标识符和第二标识符之间的防伪标签的图像进行采集。
或者,步骤S502包括:在扫描到第一标识符时,采集第一标识符后面预设范围的防伪标签的图像,其中,第一标识符设置于防伪标签的前面。
当只在防伪标签的图像的前面设置第一标识符时,可以只对第一标识符后面预设范围的防伪标签的图像进行采集。
又或者,步骤S502包括:在扫描到终止符(即上述第二标识符所在的位置)时,采集终止符前面预设范围的防伪标签的图像,其中,终止符设置于防伪标签的后面。
当只在防伪标签的后面设置终止符时,可以只对终止符前面预设范围的防伪标签的图像进行采集。
步骤S503:识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。
利用预定的规则对第一数据的格式进行定义,例如,第一数据要求是10个字符,如果规定坐标的位数是两位时,默认规定仅体现5个粒子的信息,字符不够的位数以零来补充,在滴膜层中有两个粒子,位置坐标分别是(0,2)和(5,3),按照横坐标由小到大的方向组合为0253(规定坐标的位数是两位)或00020503(规定坐标的位数是四位),则第一数据为0253000000或0002050300;按照纵坐标有大到小的方向组合为5302(规定坐标的位数是两位)或05030002(规定坐标的位数是四位),则第一数据为5302000000或0503000200。如果滴膜层中粒子的数量很多,粒子的位置坐标组合在一起后字符数多于10,则将10个字符以后的字符忽略,不计入第一数据中。当然,在实际应用中,第一数据的格式的规则的制定并不限于上述方式,在此不做限制。
步骤S503具体包括:识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果粒子颜色为两种或两种以上,则颜色的分布也是随机的。
例如红色是01,黄色是02,黑色是03,绿色是04等等,如果上述的两个粒子一个是红色,一个是绿色,那么按照横坐标由小到大的方向且颜色有大到小的顺序进行排列组合,第一数据为0253010400(规定坐标的位数是两位)或者000205030104(规定坐标的位数是四位)。
步骤S504:在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。
其中,第二数据是移动设备的号码中预定位数的号码,或者是国际移动用户识别码中预定位数的代码IMSI,或者是国际移动设备识别码IMEI中预定位数的代码中的一种。
移动用户的号码、国际移动用户识别码IMSI以及国际移动设备识别码IMEI对每个移动设备来说都是与移动设备本机关联的唯一性数据。为了保护移动用户的隐私,防止移动用户号码的泄密,第二数据包括移动设备的号码中预定位数的号码、或国际移动用户识别码IMSI中预定位数的代码或国际移动设备识别码IMEI中预定位数的代码,这样既可以获得移动设备唯一性的数据,又可以保护用户的隐私。例如,移动设备的号码是13777778888,预定后面的6位,则第二数据是778888。
或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。
移动设备本机扫描的时间数据和移动设备本机扫描的地点数据都是与移动设备本机关联的唯一性数据,因此,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或移动设备本机扫描的时间数据和扫描的地点数据的组合数据。例如,扫描的时间是2013年5月20日10点15分,地点是北京,第二数据可以是移动设备本机扫描的时间数据1305201015,或第二数据可以是移动设备本机扫描的地点数据beijing,如果第二数据是移动设备本机扫描的时间数据和扫描的地点数据的组合数据,那么第二数据是1305201015beijing。
需要说明的是,如果移动设备具备全球定位系统GPS导航功能,则移动设备本机扫描的地点是GPS定位导航的地点,如果移动设备不具备GPS导航功能或者没有开启GPS导航功能,则移动设备本机扫描的地点是该移动设备的号码归属地的地点。
当然,在实际应用中,也可以将移动设备的号码中预定位数号码、国际移动用户识别码IMSI中预定位数的代码或国际移动设备识别码IMEI中预定位数的代码与移动设备本机扫描的时间数据、移动设备本机扫描的地点数据、或移动设备本机扫描的时间数据和扫描的地点数据的组合数据进行组合以获得第二数据,在此不做限制。
步骤S505:移动设备向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。
验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,所谓映射数据是指与第一数据和第二数据对应的另外一组数据,例如:第一数据是1234,第二数据是5678,第一数据的映射数据ABCD和第二数据的映射数据是EFGH,那么第一数据和第二数据组合在一起的映射数据是ABCDEFGH。如果验证数据是第一数据和第二数据组合在一起的映射数据,在验证服务器中可以将该映射数据反映射重新获得第一数据和第二数据。当然,在实际应用中,如果第一数据的映射数据和第二数据的映射数据也分别是唯一的,那么也可以以第一数据的映射数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果。
移动设备向鉴别服务器发送验证数据,鉴别服务器根据第一数据查找匹配验证数据的正确结果,如果能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。
步骤S506:移动设备接收来自鉴别服务器的鉴别结果。
当鉴别服务器获得鉴别结果后,将该鉴别结果向移动设备发送,移动设备接收来自鉴别服务器的鉴别结果。例如,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据一致时,鉴别服务器向移动设备返回鉴别结果为真实标签,并返回本次的第一数据和第二数据,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据不一致时,鉴别服务器向移动设备返回鉴别结果为非真实标签,并返回本次的第一数据和第二数据,例如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888,当验证结果为真实标签,返回验证结果时附上本次获得的第一数据0121548498和第二数据788888,当验证结果为非真实标签,返回验证结果时也附上本次获得的第一数据0121548498和第二数据788888。
或者,鉴别服务器可以将第一次的验证数据保存在鉴别服务器中,在向移动设备发送鉴别结果的时候,将第一次验证保存的与该第一数据对应的验证数据中的第二数据或者第二数据的映射数据也向移动设备发送,如果没有保存的与该第一数据对应的验证数据,则不发送本次与该第一数据对应的验证数据的第二数据或者第二数据的映射数据。在鉴别结果是真实标签时,如果移动设备没有收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品是第一次验证,如果移动设备收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品不是第一次验证,曾经验证过。例如,移动设备本机本次获得的第二数据是1305301305beijing,来自鉴别服务器的第二数据是1305201015beijing,表明在2013年5月20日10点15分钟在北京已经有人验证过该产品,也可以说明该产品曾经被人使用过。又如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888时,如果鉴别服务器没有发送第二数据,表明该产品是第一次验证;如果鉴别服务器发送的第二数据是788888,表明用户使用该移动设备对该产品进行第二次验证;如果鉴别服务器发送的第二数据是785512,表明该产品在另外的移动设备上进行第二次验证,或者该产品曾经验证过,或该产品被人使用过。
当然,鉴别服务器以什么样的方式向移动设备发送鉴别结果,在实际应用中,可以根据实际情况进行确定,并不限于上述方式,在此不做限制。
本发明实施方式移动设备扫描并采集防伪标签的图像,识别所述滴膜层中的粒子的数量以及位置,并将所述识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据都是唯一性的数据,特别是第一数据,通过上述方式,可以确保验证数据的唯一性,从而提高防伪的可靠性。
参阅图11,图11是本发明移动设备一实施方式的结构示意图,该移动设备包括:扫描采集模块11、第一数据获得模块12、第二数据获得模块13、发送模块14以及接收模块15。
需要说明的是,本实施方式的移动设备可以执行图10所示方法流程中所有的步骤。
扫描采集模块11用于扫描并采集防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。
其中,扫描采集模块11还用于在扫描到第一标识符时,采集第一标识符后面防伪标签的图像;在扫描到第二标识符时,停止采集第二标识符后面的图像,其中,第一标识符设置于防伪标签的前面,第二标识符设置于防伪标签的后面。
其中,扫描采集模块11还用于在扫描到第一标识符时,采集第一标识符后面预设范围的防伪标签的图像,其中,第一标识符设置于防伪标签的前面。
第一数据获得模块12用于识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。
第一数据获得模块12具体用于识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果颜色为两种或两种以上,则颜色的分布也是随机的。
第二数据获得模块13用于在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。
第二数据可以是移动设备的号码中预定位数的号码,或者是国际移动用户识别码IMSI中预定位数的代码,或者是国际移动设备识别码IMEI中预定位数的代码。
或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。
发送模块14用于向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。
接收模块15用于接收来自鉴别服务器的鉴别结果。
本发明实施方式移动设备扫描并采集防伪标签的图像,识别所述滴膜层中的粒子的数量以及位置,并将所述识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据都是唯一性的数据,特别是第一数据,通过上述方式,可以确保验证数据的唯一性,从而提高防伪的可靠性。
参阅图12,图12是本发明移动设备另一实施方式的结构示意图,移动设备包括:第一数据获得模块21、第二数据获得模块22、发送模块23以及接收模块24。
需要说明的是,本实施方式的移动设备可以执行图1所示方法流程中的步骤S102至步骤S105。
第一数据获得模块21用于获取对防伪信息进行识别而得到的第一数据,第一数据用以唯一标识相应物体。
第一数据获得模块21具体用于用带有摄像头的移动设备采集位于物体上的标识或防伪标签的图像,并进行光学识别,以获得第一数据。
标识或防伪标签包括但不限于文字、或字符或文字和字符的组合,或二维码或条形码。
第一数据获得模块21包括:第三采集单元和第一数据获得单元。
第三采集单元用于用带有摄像头的移动设备采集物体上的防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。
第一数据获得单元用于光学识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。
第一数据获得单元具体用于光学识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果颜色为两种或两种以上,则颜色的分布也是随机的。
第一数据获得模块21还包括第一采集单元,第一采集单元用于用带有摄像头的移动设备对物体上的防伪标签的图像进行扫描;在扫描到第一标识符时,采集第一标识符后面防伪标签的图像;在扫描到第二标识符时,停止采集第二标识符后面的图像,其中,第一标识符设置于防伪标签的前面,第二标识符设置于防伪标签的后面。
第一数据获得模块21还包括第二采集单元,第二采集单元用于用带有摄像头的移动设备对物体上的防伪标签的图像进行扫描;在扫描到第一标识符时,采集第一标识符后面预设范围的防伪标签的图像,其中,第一标识符设置于防伪标签的前面。
第二数据获得模块22用于在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。
第二数据可以是移动设备的号码中预定位数的号码,或者是国际移动用户识别码IMSI中预定位数的代码,或者是国际移动设备识别码IMEI中预定位数的代码中的一种。或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。
发送模块23用于向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。
接收模块24用于接收来自鉴别服务器的鉴别结果。
本发明实施方式移动设备获取对防伪信息进行识别而得到的第一数据,所述第一数据用以唯一标识相应物体;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据是代表唯一性的数据,特别是第一数据用以唯一标识相应物体,通过这种方式,确保防伪信息的唯一性,仿造者无法复制,提高了防伪的可靠性。
参阅图13,图13是本发明移动设备两个实施方式的结构示意图,移动设备包括:扫描模块31、光学识别模块32。
需要说明的是,本实施方式的移动设备可以执行图2和图3所示方法流程中所有的步骤。
扫描模块31用于对第一光学扫描区域进行光学扫描。
其中,第一标识符设置于第二光学扫描区域的前面,第二标识符设置于第二光学扫描区域的后面。
扫描模块31具体用于按照行向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。扫描模块31还用于按照列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
光学识别模块32用于在扫描到第一标识符时,对第一标识符后面的预定范围的第二光学扫描区域进行光学识别。或用于在扫描到第一标识符时,对第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对第二光学扫描区域进行光学识别。
第二光学扫描区域是防伪标签。防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。
本发明实施方式对第一光学扫描区域进行光学扫描;在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面。由于设置了第一标识符和第二标识符或者只是设置第一标识符,标识了识别的起始位置,通过这种方式,可以快速扫描和识别,减少了扫描设备的负荷。
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
Claims (13)
- 一种光学识别方法,其特征在于,所述方法包括:按照行向或列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点;在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面,所述第二光学扫描区域是防伪标签。
- 根据权利要求1所述的方法,其特征在于,所述第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
- 根据权利要求1所述的方法,其特征在于,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。
- 一种光学识别方法,其特征在于,所述方法包括:对第一光学扫描区域进行光学扫描;在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面。
- 根据权利要求4的方法,其特征在于,所述对第一光学扫描区域进行光学扫描的步骤包括:按照行向或列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。
- 根据权利要求5所述的方法,其特征在于,所述第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
- 根据权利要求4所述的方法,其特征在于,所述第二光学扫描区域是防伪标签。
- 根据权利要求7所述的方法,其特征在于,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。
- 一种移动设备,其特征在于,所述移动终端包括:扫描模块,用于对第一光学扫描区域进行光学扫描;光学识别模块,用于在扫描到第一标识符时,对所述第一标识符后面的预定范围的第二光学扫描区域进行光学识别;或用于在扫描到第一标识符时,对所述第一标识符后面的第二光学扫描区域进行光学识别,在扫描到第二标识符时,停止对所述第二光学扫描区域进行光学识别;其中,所述第一标识符设置于所述第二光学扫描区域的前面,所述第二标识符设置于所述第二光学扫描区域的后面。
- 根据权利要求9所述的移动设备,其特征在于,所述扫描模块具体用于按照行向或列向对第一光学扫描区域进行逐行光学扫描,并且每行仅扫描前面第一个扫描点。
- 根据权利要求10所述的移动设备,其特征在于,所述第一标识符设置于第二光学扫描区域中的扫描方向的最前面。
- 根据权利要求9所述的移动设备,其特征在于,所述第二光学扫描区域是防伪标签。
- 根据权利要求12所述的移动设备,其特征在于,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310423051.0A CN104463290B (zh) | 2013-09-16 | 2013-09-16 | 光学识别方法及移动设备 |
CN201310423051.0 | 2013-09-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015035704A1 true WO2015035704A1 (zh) | 2015-03-19 |
Family
ID=52664990
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/086959 WO2015035704A1 (zh) | 2013-09-16 | 2013-11-12 | 光学识别方法及移动设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104463290B (zh) |
WO (1) | WO2015035704A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108918528B (zh) * | 2018-06-01 | 2023-08-01 | 深圳回收宝科技有限公司 | 一种终端检测方法、装置及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040112962A1 (en) * | 2000-12-20 | 2004-06-17 | Farrall Andrew John | Security, identificaiton and verification systems |
CN1661627A (zh) * | 2004-02-27 | 2005-08-31 | 微软公司 | 具有随机出现特征的防假冒和防篡改标签 |
CN1678881A (zh) * | 2002-08-30 | 2005-10-05 | 瑞尼斯豪公司 | 扫描方法 |
US20090325640A1 (en) * | 2008-04-09 | 2009-12-31 | Ven Chava | System and Method for Multimedia Storing and Retrieval Using Low-Cost Tags as Virtual Storage Mediums |
-
2013
- 2013-09-16 CN CN201310423051.0A patent/CN104463290B/zh not_active Expired - Fee Related
- 2013-11-12 WO PCT/CN2013/086959 patent/WO2015035704A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040112962A1 (en) * | 2000-12-20 | 2004-06-17 | Farrall Andrew John | Security, identificaiton and verification systems |
CN1678881A (zh) * | 2002-08-30 | 2005-10-05 | 瑞尼斯豪公司 | 扫描方法 |
CN1661627A (zh) * | 2004-02-27 | 2005-08-31 | 微软公司 | 具有随机出现特征的防假冒和防篡改标签 |
US20090325640A1 (en) * | 2008-04-09 | 2009-12-31 | Ven Chava | System and Method for Multimedia Storing and Retrieval Using Low-Cost Tags as Virtual Storage Mediums |
Also Published As
Publication number | Publication date |
---|---|
CN104463290B (zh) | 2018-01-09 |
CN104463290A (zh) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015035701A1 (zh) | 防伪标签、防伪标签的制造方法以及防伪方法 | |
WO2015035702A1 (zh) | 防伪方法及移动设备 | |
WO2016209020A1 (en) | Image processing apparatus and image processing method | |
WO2018074870A1 (ko) | 이미지 인증을 이용한 증강현실 객체 제공 방법 및 제공 서버 | |
WO2014029196A1 (zh) | 基于二维码防伪识别方法及系统 | |
WO2020032482A1 (ko) | 공카드를 이용한 금융거래제공방법 및 시스템 | |
WO2014171680A1 (en) | Mobile terminal, security server and payment method thereof | |
WO2018166091A1 (zh) | 贷款面签方法、系统、终端及计算机可读存储介质 | |
WO2020101420A1 (ko) | 증강현실 기기의 광학 특성 측정 방법 및 장치 | |
WO2017039290A1 (ko) | 가상 주소를 이용한 택배 처리시스템 및 방법 | |
WO2020149500A1 (ko) | 공유된 키를 등록하기 위한 방법 및 장치 | |
WO2009145499A2 (en) | Method and apparatus for managing tokens for digital rights management | |
WO2019143050A1 (en) | Electronic device and method for controlling autofocus of camera | |
WO2014017882A1 (ko) | 데이터 동기화를 수행하는 단말 및 서버 | |
WO2015035705A1 (zh) | 光学识别方法及移动设备 | |
WO2015035704A1 (zh) | 光学识别方法及移动设备 | |
WO2015035703A1 (zh) | 防伪方法及移动设备 | |
WO2020206885A1 (zh) | 解锁方法及装置 | |
WO2018160031A1 (ko) | 시야 각도, 방향 및 거리에 따른 시인 특성을 활용한 위조방지시트 및 이의 제조방법과 인식방법 | |
WO2020189993A1 (ko) | 암호화폐 분실 방지 방법 및 시스템 | |
WO2020231053A1 (ko) | 센서 모듈을 포함하는 전자 장치 | |
WO2016175422A1 (ko) | 모바일 스탬프 장치 | |
WO2022055160A1 (ko) | 식별코드 및 보안일련번호 이원화를 통한 정품 인증 시스템 및 그 방법 | |
WO2017026651A1 (ko) | 전자 상거래 방법 | |
EP2992503A1 (en) | Apparatus and method for generating image data in portable terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13893278 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13893278 Country of ref document: EP Kind code of ref document: A1 |