WO2015035705A1 - Procédé de reconnaissance optique et dispositif mobile - Google Patents

Procédé de reconnaissance optique et dispositif mobile Download PDF

Info

Publication number
WO2015035705A1
WO2015035705A1 PCT/CN2013/086962 CN2013086962W WO2015035705A1 WO 2015035705 A1 WO2015035705 A1 WO 2015035705A1 CN 2013086962 W CN2013086962 W CN 2013086962W WO 2015035705 A1 WO2015035705 A1 WO 2015035705A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
scanning area
target scanning
mobile device
target
Prior art date
Application number
PCT/CN2013/086962
Other languages
English (en)
Chinese (zh)
Inventor
林于翔
孙福军
Original Assignee
深圳市同盛绿色科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市同盛绿色科技有限公司 filed Critical 深圳市同盛绿色科技有限公司
Publication of WO2015035705A1 publication Critical patent/WO2015035705A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • G01N21/8851Scan or image signal processing specially adapted therefor, e.g. for scan signal adjustment, for detecting different kinds of defects, for compensating for structures, markings, edges
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • G01N21/8851Scan or image signal processing specially adapted therefor, e.g. for scan signal adjustment, for detecting different kinds of defects, for compensating for structures, markings, edges
    • G01N2021/8887Scan or image signal processing specially adapted therefor, e.g. for scan signal adjustment, for detecting different kinds of defects, for compensating for structures, markings, edges based on image processing techniques

Definitions

  • the present invention relates to the field of anti-counterfeiting technology, and in particular to an optical recognition method and a mobile device.
  • Anti-counterfeiting is an important proposition in the trading of goods.
  • it is usually necessary to first scan the anti-counterfeit label for anti-counterfeiting information.
  • it is a progressive scan line by line. Even if the scanned area is not the destination area, the scanning speed is slow, which increases the load of the scanning device.
  • the technical problem to be solved by the present invention is to provide an optical recognition method and a mobile device capable of quickly scanning and identifying an optical scanning area and reducing the load of the scanning device.
  • the present invention provides an optical recognition method comprising: locking the target scanning area according to a boundary feature of a target scanning area before performing optical recognition; and optically identifying the locked target scanning area.
  • the boundary feature is obtained by identifying a difference between a color of the target scanning area itself and a color outside the target scanning area.
  • the boundary feature is obtained by identifying a graphic or color defining a boundary of the target scanning area.
  • the step of locking the target scanning area according to the boundary feature of the target scanning area includes: determining, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement, and performing the boundary according to the target scanning area if the requirement is met. The step of feature locking the target scan area, otherwise the step of locking the target scan area according to the target scan area boundary feature is not performed.
  • the step of determining, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement includes: determining, at the current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm;
  • the error correction algorithm corrects the current scan angle to meet the requirements.
  • the step of optically recognizing the locked target scanning area includes optically recognizing and correcting the locked target scanning area if the current scanning angle satisfies the requirement.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, wherein the angle is an angle between the scanned light and the target scanning area plane.
  • the step of optically recognizing the locked target scanning area includes: if the locked target scanning area is deformed and the deformation is within a predetermined range, the optical recognition is performed by using an error correction algorithm
  • the target scanning area performs error correction and restoration.
  • the target scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
  • the present invention provides a mobile device, comprising: a locking module, configured to lock the target scanning area according to a boundary feature of a target scanning area before performing optical recognition; and an optical identification module for The locked target scanning area is optically identified.
  • the boundary feature is obtained by identifying a difference between a color of the target scanning area itself and a color outside the target scanning area.
  • the boundary feature is obtained by identifying a graphic or color defining a boundary of the target scanning area.
  • the mobile device further includes a judging module, configured to determine, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement, and return to the locking module when the requirement is met.
  • the determining module is specifically configured to determine, according to the current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm, and when the correction can be performed by an error correction algorithm, determine that the current scanning angle meets the requirement.
  • the optical identification module is specifically configured to optically identify and correct the locked target scanning area when the current scanning angle meets the requirement.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, wherein the angle is an angle between the scanned light and the target scanning area plane.
  • the mobile device further includes an error correction and restoration module, and the error correction and restoration module is configured to perform optical recognition by using an error correction algorithm when the locked target scanning area is deformed and the deformation is within a predetermined range.
  • the subsequent target scanning area performs error correction and restoration.
  • the target scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
  • the present invention locks the target scanning area according to the boundary feature of the target scanning area before performing optical recognition; and optically identifies the locked target scanning area. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, enabling rapid scanning recognition and reducing the load on the scanning device.
  • FIG. 1 is a flow chart of an embodiment of an anti-counterfeiting method of the present invention
  • FIG. 2 is a flow chart of an embodiment of an optical recognition method of the present invention
  • FIG. 3 is a flow chart of another embodiment of the optical recognition method of the present invention.
  • FIG. 4 is a schematic structural view of an embodiment of an anti-counterfeit label of the present invention.
  • FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 6 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 7 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 9 is a flow chart of an embodiment of a method for manufacturing an anti-counterfeit label of the present invention.
  • FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
  • FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
  • FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention.
  • FIG. 1 is a flowchart of an embodiment of an anti-counterfeiting method according to the present invention, including:
  • Step S101 The first data that uniquely identifies the corresponding object is saved in the authentication server.
  • the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
  • Step S102 The mobile device acquires first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
  • the anti-counterfeiting information is used to uniquely identify the corresponding object, and may indicate that the object is not a counterfeit product.
  • the mobile device After the mobile device identifies the anti-counterfeiting information, the first data is obtained, and the first data can uniquely identify the corresponding object.
  • the mobile device can use the built-in camera to identify the anti-counterfeiting information.
  • the step S102 specifically includes: capturing, by using a mobile device with a camera, an image of the identifier or the anti-counterfeit tag located on the object, and performing optical recognition to obtain the first One data.
  • the image of the identification or security label on the object includes, but is not limited to, text, characters, combinations of text and characters, two-dimensional codes or barcodes, and the like.
  • the image of the anti-counterfeit label on the object is collected by a mobile device with a camera, wherein the anti-counterfeit label comprises a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles to the base layer, and drying and solidifying, the drip layer At least the number and location of the particles in the particle are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • A includes: scanning an image of the security label on the object with a mobile device with a camera; first, locking the target scanning area according to the boundary feature of the target scanning area; and then acquiring an image of the security label of the locked target scanning area.
  • the target scanning area refers to the scanning area that is indispensable for identifying the anti-counterfeiting information. If the target scanning area is smaller than the target scanning area, incomplete anti-counterfeiting information is obtained, and the target anti-counterfeiting information can be obtained by the target scanning area.
  • the scanning area where the security label is located is a relatively large area. In this area, not all information is necessary, and some areas are still blank areas. In order to improve scanning speed and efficiency, setting boundary features around the target scanning area helps. Quickly lock the target scanning area, and only identify the anti-counterfeiting information of the target scanning area, which can obtain complete anti-counterfeiting information and improve scanning speed and efficiency.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
  • the number and position of the particles in the drip layer are optically identified, and the number and position of the particles in the identified drip layer are sequentially combined into the first data.
  • the format of the first data is defined by a predetermined rule.
  • the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
  • the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
  • the rule of the format of the first data is not limited to the above manner, and is not limited herein.
  • B specifically: optically recognizing the number, position and color of the particles in the drip layer, and identifying the drip film
  • the number, position and color of the particles in the layer are sequentially combined into the first data, wherein all the particles in the drip layer are at least one color, and if the color of the particles is two or more, the distribution of the colors is also random. of.
  • the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
  • Step S103 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data is a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
  • the second data includes a predetermined number of digits in the number of the mobile device, an International Mobile Subscriber Identity (IMSI) or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI. Data that is unique to the mobile device can be obtained, and the privacy of the user can be protected. For example, the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
  • the scanning time is 10:15 on May 20, 2013, the location is Beijing
  • the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
  • the second data is 1305201015beijing.
  • the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
  • the code of the predetermined number of bits in the number of the mobile device, the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity (IMEI), and the time data of the mobile device's local scanning may be moved.
  • the location data scanned by the device, or the combined data of the time data scanned by the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
  • Step S104 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
  • the first data is 1234
  • the second data is 5678
  • the mapping data ABCD of the first data and the mapping data of the second data are EFGH
  • the mapping data in which the first data and the second data are combined is ABCDEFGH.
  • the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
  • the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
  • the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
  • Step S105 The mobile device receives the authentication result from the authentication server.
  • the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
  • the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
  • the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
  • the verification result is a real label
  • the first data obtained this time is attached 01021548498.
  • the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
  • the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or
  • the mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data.
  • the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
  • the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
  • the second data obtained by the mobile device itself is 1305301305beijing
  • the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
  • the authentication server does not send the second data, it indicates that the product is the first verification
  • the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
  • the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
  • the authentication server sends the authentication result to the mobile device.
  • the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
  • the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
  • step S102 when the mobile device acquires the identification of the anti-counterfeiting information, an optical identification method is involved.
  • FIG. 2 and FIG. 3 are flowcharts of two embodiments of the optical identification method of the present invention, including:
  • Step S201 Before performing optical recognition, the target scanning area is locked according to the boundary feature of the target scanning area.
  • the target scanning area refers to a scanning area that is indispensable for effective optical recognition. If the target scanning area is smaller than the target scanning area, incomplete optical identification information is obtained, and the optical identification information can be obtained by the target scanning area.
  • the scanning area is a relatively large area in which not all information is necessary, and some areas are still blank areas.
  • boundary features are set around the target scanning area. Helps quickly lock the target scanning area and optically recognize only the target scanning area, which can obtain complete optical identification information and improve scanning speed and efficiency.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • Step S202 Optically identifying the locked target scanning area.
  • the scanning method is that each line sweeps from the head to the tail, and the non-optical scanning area also takes a lot of time during the scanning, and also increases the load of the scanning device. In the above manner, the purpose of fast scan recognition can be achieved, and the load of the scanning device is reduced.
  • the embodiment of the present invention can quickly lock the target scanning area by the boundary feature of the target scanning area, thereby improving the speed of scanning recognition and reducing the load of the mobile device when performing identification.
  • step S203 is included, and the specific content of step S203 is:
  • Step S203 Determine whether the angle of the scanning meets the requirement according to the boundary feature of the target scanning area. If the requirement is met, step S201 is performed; otherwise, step S201 is not performed.
  • the step of determining whether the angle of the scanning meets the requirements according to the boundary feature of the target scanning area includes:
  • A1 Under the current scanning angle, it is determined whether the boundary feature of the target scanning area can be corrected by an error correction algorithm.
  • the boundary characteristics of the target scanning area are usually deformed, and the scanning device may not be able to lock the boundary feature of the target scanning area without processing. . Therefore, within a certain range of scanning angles, correction can be performed by an error correction algorithm, so that the scanning device can still lock the boundary features of the target scanning area. When the correction can be made by the error correction algorithm, the current scanning angle is satisfactory.
  • step S202 the specific content of step S202 is: if the current scanning angle satisfies the requirement, optically recognize and correct the locked target scanning area.
  • the locked target scanning area is optically recognized while being corrected by the error correction algorithm to obtain the corrected identification information.
  • the target scanning area boundary feature is not corrected when the target scanning area is locked by the target scanning area boundary feature, that is, the scanning device automatically locks the target scanning area by the target scanning area boundary feature, then the target scanning area is optically When identifying, the result of optical recognition can also be corrected according to the actual situation.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, and the angle is an angle between the scanned light and the plane of the target scanning area.
  • the first threshold is 75 degrees and the second threshold is 105 degrees.
  • the defined boundary feature is a rectangle
  • the rectangle sensed on the mobile device is deformed, and the deformation is in a predetermined relationship with the tilt angle, and the tilt angle is obtained by using the predetermined relationship and the obtained degree of deformation.
  • the boundary features of the target scan area are not easily recognized, or an error is recognized, resulting in that the target scan area cannot be correctly locked.
  • the method further comprises: performing error correction and restoration on the optically recognized target scanning area by using an error correction algorithm if the locked target scanning area is deformed and deformed within a predetermined range.
  • the target scanning area is a rectangular anti-counterfeit label, and the anti-counterfeiting label is attached to a spherical or curved cup.
  • the target scanning area is deformed by being attached to a spherical or curved cup, and becomes a ring or an arc. If the deformation is within a predetermined range, the error correction algorithm may be used to correct and restore the optically recognized target scanning area.
  • the target scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the target scanning area is locked according to the boundary feature of the target scanning area; and the locked target scanning area is optically recognized. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, and the scanning and identification can be quickly performed, thereby reducing the load on the scanning device.
  • step S102 if the image of the security label located on the object is collected by the mobile device, the anti-counterfeit label of the present invention shown in the following figure, the anti-counterfeiting method related to the anti-counterfeit label, and the manufacturing method of the anti-counterfeit label are also involved here. .
  • FIG. 4 is a schematic structural diagram of an anti-counterfeit label according to an embodiment of the present invention.
  • the anti-counterfeit label 10 includes a base layer 101 and a drip layer 102.
  • the drip layer 102 is composed of a colloid 1022 including a plurality of particles 1021. After being dispersed into the base layer 101, it is formed by drying and solidification, wherein at least the number and position of the particles 1021 in the drip film layer 102 are random.
  • Anti-counterfeit label 10 also known as anti-counterfeit label or anti-counterfeit trademark, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachment of the subject matter (such as merchandise listing, business card and security card), with anti-counterfeiting The identity of the role.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the drip film in the anti-counterfeit label comprises a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
  • the anti-counterfeit label 20 includes a base layer 201 and a drip layer 202.
  • the drip layer 202 is a colloid comprising a plurality of particles 2021. After 2022 is dispersed into the base layer 201, it is formed by drying and solidification, wherein at least the number and position of the particles 2021 in the drip film layer 202 are random.
  • the base layer 201 is printed with a coordinate system 2011, a random number of particles 2021 are randomly distributed in the coordinate system 2011, and a droplet layer 202 is first recorded after the formation of the coordinates of all the particles 2021 thereof, and a coordinate sequence forming a predetermined length is recorded in the database. Verify the authenticity when it is to be verified. By printing the coordinate system on the base layer, the anti-counterfeiting accuracy of the security label can be increased.
  • the particle when recording or identifying the coordinates of a particle, if the coordinates of the particle are not easily determined, the particle may be ignored, or the coordinate of the particle may be determined by an algorithm for determining the coordinate. If the number of particles in the drip layer is large, and the number of characters of the particle is combined more than the preset number of characters, the characters after the preset number of characters are ignored.
  • all the particles 2021 in one drip film layer 202 have at least one color, and if the color is two or more, the color distribution is also random. As shown in FIG. 5, there are two color particles, which are red particles 20211 and yellow particles 20212, respectively.
  • the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm.
  • a common scanning device can distinguish individual particles; the other case is the diameter of the particles.
  • ordinary scanning devices cannot distinguish individual particles, and special scanning equipment with tools such as magnifying glasses or low power microscopes is required. Resolve individual particles.
  • the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
  • the colloid in the anti-counterfeit label may be transparent or not transparent. If it is not transparent, it has special requirements for particles or scanning equipment, such as scanning equipment with X-ray irradiation function, or particle belt. There is some kind of marker, and the scanning device is a scanning device with the identification of the marker.
  • the security label 30 further includes a boundary feature: a first rectangle 303 and a second rectangle 304, and the first rectangle 303 and the second rectangle 304 are disposed on the base layer 301, first The area enclosed by the rectangle 303 and the second rectangle 304 is the target scanning area, that is, the area covered by the falling film layer 302.
  • the target scanning area can be quickly locked by the boundary feature first rectangle and the second rectangle.
  • data can be collected without collecting data, thereby improving the speed of scanning and collecting the data of the security label and reducing the load of the scanning device.
  • boundary features may be other specified graphics in addition to the rectangles described above.
  • the boundary feature may also adopt other manners, such as using a specified color or the like at the boundary of the target scanning area, or adopting different colors for the target scanning area and the non-target scanning area, respectively, so that the target scanning area and the non-target scanning area are formed. Obvious boundary features.
  • the anti-counterfeit label in the above FIG. 4 to FIG. 7 may further include a coating covering the base layer and the uppermost layer of the drip film layer, and the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • FIG. 8 is a flowchart of another embodiment of the anti-counterfeiting method of the present invention.
  • the embodiment is a flowchart of an anti-counterfeiting method when the anti-counterfeit tag is the anti-counterfeit tag described in FIG. 4 to FIG. 7 , and includes:
  • Step S301 Scan and collect an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer are at least The quantity and location are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the step of scanning and collecting the image of the security label includes: before acquiring the image of the security label, locking the target scanning area according to the boundary feature of the target scanning area; and collecting the image of the security label for the locked target scanning area.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
  • Step S302 Identifying the number and position of the particles in the drip layer to obtain verification data.
  • the step S302 specifically includes: identifying the number, position, and color of the particles in the drip layer, wherein all the particles in the drip layer have at least one color, and if there are two or more colors, the color distribution is also random. of.
  • the color of the particles is increased, and the distribution of the colors is also random. In this way, the difficulty of counterfeiting the security label is further increased, and the reliability of the security label is improved.
  • the step S302 may specifically include the following content:
  • C1 The number and position of the particles in the identified drip layer are sequentially combined into the first data.
  • C2 one of a predetermined number of digits in the number of the mobile device generated when the first data is to be identified, a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), and a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI The two are combined into the second data.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • C3 The first data and the second data are sequentially combined into the final verification data.
  • the first data basically represents the uniqueness of the security label
  • the second data is a predetermined number of digits in the number of the mobile device generated when the first data is identified, the international mobile user
  • the combination of the code of the predetermined number of bits in the identification code IMSI and the code of the predetermined number of bits in the international mobile device identification code IMEI further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting. If the second data is generated by identifying at least the time data and the location data is sequentially combined, this further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting.
  • Step S303 Find the correct result of the matching verification data in the database. If the correct result of the matching is found, it is determined that the anti-counterfeit label is a real label, otherwise it is determined to be a false label, wherein the correct result is all the particles in the falling layer After the coordinates are dispersed, a coordinate sequence of a predetermined length is formed as a correct result to be recorded in the database to verify the authenticity when to be verified.
  • a coordinate sequence forming a predetermined length is recorded as a correct result in the database, and the verification data is obtained by identifying the number and position of the particles in the drip layer, and thus, in the database If the matching verification data can be found, the anti-counterfeit label is a real label, otherwise it is a fake label. If the verification data includes the combined data of the first data and the second data, and the correct result of the matching verification data is searched according to the first data, if the correct result of the matching is found, the authentication result is determined that the security label is a real label, Otherwise it is judged to be a false label.
  • Embodiments of the present invention scan and collect images of security labels, identify the number and location of particles in the drop layer to obtain verification data, and find the correct results in the database that match the verification data. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • FIG. 9 is a flowchart of an embodiment of a method for manufacturing an anti-counterfeit label according to the present invention, including:
  • Step S401 adding a plurality of particles to the colloid.
  • the materials of the particles herein include, but are not limited to, plastics, metals, ceramics, and the like, and are not limited herein.
  • Colloid also known as colloidal dispersion, is a type of dispersion system in which the diameter of the dispersed particles is between the crude dispersion system and the solution. It may be transparent or non-transparent, and is not limited.
  • step S401 comprises: adding a plurality of particles to the transparent colloid and stirring.
  • Step S402 Dispersing the colloid containing the particles onto the base layer to form a film containing the particles.
  • the step of dispersing the colloid containing the particles onto the base layer comprises: dropping, adding or spraying the colloid containing the particles onto the base layer.
  • the step of forming the film containing the particles comprises: printing a coordinate system on the surface of the substrate, the film being in a printing coordinate system, wherein a random number of particles are randomly distributed in the coordinate system.
  • Printing the coordinate system on the surface of the base layer can better identify the random position coordinates of a random number of particles, and improve the anti-counterfeiting precision of the anti-counterfeit label.
  • the step of printing a coordinate system on the surface of the base layer includes: printing a coordinate system and a boundary feature on the surface of the base layer: a first rectangle and a second rectangle, wherein the area enclosed by the first rectangle and the second rectangle is the target scanning area. That is, the area covered by the drip film layer.
  • the target scanning area can be quickly locked by the boundary feature first rectangle and the second rectangle.
  • data can be collected without collecting data, thereby improving the speed of scanning and collecting the data of the security label and reducing the load of the scanning device.
  • boundary features may be other specified graphics in addition to the rectangles described above.
  • the boundary feature may also adopt other manners, such as using a specified color or the like at the boundary of the target scanning area, or adopting different colors for the target scanning area and the non-target scanning area, respectively, so that the target scanning area and the non-target scanning area are formed. Obvious boundary features.
  • Step S403 The film is dried and solidified, wherein at least the number and position of the particles in the film are random.
  • step S403 the method further includes:
  • D1 Record the coordinates of all or a predetermined number of particles in the film, obtain a coordinate sequence of a predetermined length, and record it in a database to verify the authenticity when it is to be verified.
  • the coating is covered on the base layer and at the top of the drip layer.
  • the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • the coating may be scraped off.
  • a condition is that the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm, within which a conventional scanning device can resolve individual particles;
  • the diameter of the particles is between 1 micrometer and 10 micrometers, for example 1 micrometer, 5 micrometers or 10 micrometers, in this range, ordinary scanning devices cannot distinguish individual particles, and need to use tools such as a magnifying glass or a low power microscope.
  • Special scanning equipment is able to distinguish individual particles. For anti-counterfeiting labels, if it is necessary to distinguish the individual particles by means of special scanning equipment with tools, this will undoubtedly increase the difficulty of counterfeiting counterfeiting and further improve the reliability of anti-counterfeiting.
  • the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
  • Embodiments of the present invention add a plurality of particles to a colloid; disperse the colloid containing the particles onto the base layer to form a film containing the particles; and dry and solidify the film, wherein at least the number and position of the particles in the film are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the anti-counterfeiting method is as shown in FIG.
  • FIG. 10 is a flowchart of still another embodiment of the anti-counterfeiting method of the present invention, including:
  • Step S501 The first data that uniquely identifies the corresponding object is saved in the authentication server.
  • the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
  • Step S502 The mobile device scans and collects an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer At least its number and location are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • Step S502 includes: before acquiring the image of the security label, locking the target scanning area according to the boundary feature of the target scanning area; and collecting the image of the security label for the locked target scanning area.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
  • Step S503 Identify the number and position of the particles in the drip layer, and combine the number and position of the particles in the identified drip layer into the first data in order.
  • the format of the first data is defined by a predetermined rule.
  • the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
  • the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
  • the rule of the format of the first data is not limited to the above manner, and is not limited herein.
  • Step S503 specifically includes: identifying the number, position, and color of the particles in the drip layer, and sequentially combining the number, position, and color of the particles in the identified drip layer into the first data, wherein the drip layer is The color of all particles is at least one. If the color of the particles is two or more, the distribution of colors is also random.
  • the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
  • Step S504 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data is a number of predetermined digits in the number of the mobile device, or a code IMSI of a predetermined number of bits in the International Mobile Subscriber Identity, or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
  • the second data comprises a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity IMEI
  • the code for the predetermined number of bits so that both the uniqueness of the mobile device data and the privacy of the user can be protected.
  • the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
  • the scanning time is 10:15 on May 20, 2013, the location is Beijing
  • the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
  • the second data is 1305201015beijing.
  • the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
  • the predetermined number of digits in the number of the mobile device may be associated with the mobile device.
  • the combined time data of the scanned time data, the location data scanned by the mobile device, or the combined time data of the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
  • Step S505 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct. The results are recorded in the database to verify the authenticity when verification is required.
  • the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
  • the first data is 1234
  • the second data is 5678
  • the mapping data ABCD of the first data and the mapping data of the second data are EFGH
  • the mapping data in which the first data and the second data are combined is ABCDEFGH.
  • the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
  • the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
  • the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
  • Step S506 The mobile device receives the authentication result from the authentication server.
  • the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
  • the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
  • the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
  • the verification result is a real label
  • the first data obtained this time is attached 01021548498.
  • the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
  • the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or
  • the mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data.
  • the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
  • the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
  • the second data obtained by the mobile device itself is 1305301305beijing
  • the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
  • the authentication server does not send the second data, it indicates that the product is the first verification
  • the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
  • the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
  • the authentication server sends the authentication result to the mobile device.
  • the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
  • the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
  • a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
  • FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
  • the mobile device includes: a scan acquisition module 11 , a first data obtaining module 12 , a second data obtaining module 13 , a sending module 14 , and a receiving module 15 .
  • the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG.
  • the scan acquisition module 11 is configured to scan and collect an image of the security label.
  • the anti-counterfeit label includes a base layer and a drip layer.
  • the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying. At least the number and location of the particles are random.
  • the scan acquisition module 11 is further configured to: before acquiring the image of the security label, lock the target scan area according to the boundary feature of the target scan area; and collect an image of the security label for the locked target scan area.
  • the first data obtaining module 12 is configured to identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
  • the first data obtaining module 12 is specifically configured to identify the number, position, and color of the particles in the drip layer, and combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
  • the second data obtaining module 13 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the sending module 14 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the receiving module 15 is configured to receive the authentication result from the authentication server.
  • the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
  • a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
  • FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
  • the mobile device includes: a first data obtaining module 21, a second data obtaining module 22, a sending module 23, and a receiving module 24.
  • the mobile device of this embodiment may perform step S102 to step S105 in the method flow shown in FIG. 1 .
  • the first data obtaining module 21 is configured to acquire first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
  • the first data obtaining module 21 is specifically configured to collect an image of the identification or anti-counterfeit label located on the object by using the mobile device with the camera, and perform optical recognition to obtain the first data.
  • Identification or security labels include, but are not limited to, text, or characters, or a combination of text and characters, or a two-dimensional code or barcode.
  • the first data obtaining module 21 includes: a third collecting unit and a first data obtaining unit.
  • the third collecting unit is configured to collect an image of the anti-counterfeit label on the object by using a mobile device with a camera, wherein the anti-counterfeiting label comprises a base layer and a drip layer, and the drip layer is dispersed and solidified by a colloid containing a plurality of particles to the base layer. Formed, at least the number and location of the particles in the drip layer are random.
  • the first data obtaining unit is configured to optically identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
  • the first data obtaining unit is specifically configured to optically identify the number, position, and color of the particles in the drip layer, and sequentially combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
  • the first data obtaining module 21 further includes a first collecting unit, configured to scan an image of the security label on the object with the mobile device with the camera; before the image of the security label is collected, according to the boundary of the target scanning area The feature locks the target scan area; the captured image of the security label is captured for the locked target scan area.
  • a first collecting unit configured to scan an image of the security label on the object with the mobile device with the camera; before the image of the security label is collected, according to the boundary of the target scanning area The feature locks the target scan area; the captured image of the security label is captured for the locked target scan area.
  • the second data obtaining module 22 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or one of the codes of the predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the sending module 23 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the receiving module 24 is configured to receive the authentication result from the authentication server.
  • the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
  • FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention.
  • the mobile device includes: a locking module 31 and an optical recognition module 32.
  • the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG. 2 and FIG.
  • the locking module 31 is configured to lock the target scanning area according to the target scanning area boundary feature before performing optical recognition.
  • the target scanning area refers to a scanning area that is indispensable for effective optical recognition. If the target scanning area is smaller than the target scanning area, incomplete optical identification information is obtained, and the optical identification information can be obtained by the target scanning area.
  • the scanning area is a relatively large area in which not all information is necessary, and some areas are still blank areas.
  • boundary features are set around the target scanning area. Helps quickly lock the target scanning area and optically recognize only the target scanning area, which can obtain complete optical identification information and improve scanning speed and efficiency.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the optical identification module 32 is for optically identifying the locked target scanning area.
  • the embodiment of the present invention can quickly lock the target scanning area by the boundary feature of the target scanning area, thereby improving the speed of scanning recognition and reducing the load of the mobile device when performing identification.
  • the mobile device further includes a judging module, wherein the judging module is configured to judge whether the angle of the scanning meets the requirement according to the boundary feature of the target scanning area, and return to the locking module 31 when the requirement is met.
  • the determining module is specifically configured to determine whether the boundary feature of the target scanning area can be corrected by the error correction algorithm under the current scanning angle, and when the correction can be performed by the error correction algorithm, determine that the current scanning angle satisfies the requirement.
  • the boundary characteristics of the target scanning area are usually deformed, and the scanning device may not be able to lock the boundary feature of the target scanning area without processing. . Therefore, within a certain range of scanning angles, correction can be performed by an error correction algorithm, so that the scanning device can still lock the boundary features of the target scanning area. When the correction can be made by the error correction algorithm, the current scanning angle is satisfactory.
  • the optical identification module 32 is specifically configured to optically recognize and correct the locked target scanning area when the current scanning angle satisfies the requirement.
  • the locked target scanning area is optically recognized while being corrected by the error correction algorithm to obtain the corrected identification information.
  • the target scanning area boundary feature is not corrected when the target scanning area is locked by the target scanning area boundary feature, that is, the scanning device automatically locks the target scanning area by the target scanning area boundary feature, then the target scanning area is optically When identifying, the result of optical recognition can also be corrected according to the actual situation.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, and the angle is an angle between the scanned light and the plane of the target scanning area.
  • the first threshold is 75 degrees and the second threshold is 105 degrees.
  • the defined boundary feature is a rectangle
  • the rectangle sensed on the mobile device is deformed, and the deformation is in a predetermined relationship with the tilt angle, and the tilt angle is obtained by using the predetermined relationship and the obtained degree of deformation.
  • the boundary features of the target scan area are not easily recognized, or an error is recognized, resulting in that the target scan area cannot be correctly locked.
  • the mobile device further includes an error correction and restoration module, and the error correction and restoration module is configured to perform error correction and restoration on the optically recognized target scanning area by using an error correction algorithm when the locked target scanning area is deformed and deformed within a predetermined range. .
  • the target scanning area is a rectangular anti-counterfeit label, and the anti-counterfeiting label is attached to a spherical or curved cup.
  • the target scanning area is deformed by being attached to a spherical or curved cup, and becomes a ring or an arc. If the deformation is within a predetermined range, the error correction algorithm may be used to correct and restore the optically recognized target scanning area.
  • the target scan area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
  • the target scanning area is locked according to the boundary feature of the target scanning area; and the locked target scanning area is optically recognized. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, and the scanning and identification can be quickly performed, thereby reducing the load on the scanning device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Credit Cards Or The Like (AREA)
  • Image Analysis (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

La présente invention concerne un procédé de reconnaissance optique qui comprend : avant qu'une reconnaissance par balayage optique soit effectuée, le verrouillage d'une région de balayage cible en fonction d'une caractéristique limite de la région de balayage cible ; et la conduite d'un balayage optique sur la région de balayage cible verrouillée. Au moyen du procédé, une reconnaissance par balayage rapide peut être effectuée, et la charge d'un dispositif de balayage peut être réduite.
PCT/CN2013/086962 2013-09-16 2013-11-12 Procédé de reconnaissance optique et dispositif mobile WO2015035705A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310423173.X 2013-09-16
CN201310423173.XA CN104463292B (zh) 2013-09-16 2013-09-16 光学识别方法及移动设备

Publications (1)

Publication Number Publication Date
WO2015035705A1 true WO2015035705A1 (fr) 2015-03-19

Family

ID=52664991

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/086962 WO2015035705A1 (fr) 2013-09-16 2013-11-12 Procédé de reconnaissance optique et dispositif mobile

Country Status (2)

Country Link
CN (1) CN104463292B (fr)
WO (1) WO2015035705A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108375578A (zh) * 2018-01-23 2018-08-07 杭州俱健基因生物科技有限公司 一种基于病理切片扫描装置的多个单区域选定扫描区域的方法
CN109543804A (zh) * 2018-11-28 2019-03-29 程昔恩 一种陶瓷防伪和验证的方法
CN112329673B (zh) * 2020-11-12 2024-05-17 北京文通科技有限公司 防伪纤维辨识方法、防伪识别方法、装置和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040112962A1 (en) * 2000-12-20 2004-06-17 Farrall Andrew John Security, identificaiton and verification systems
CN101207681A (zh) * 2006-12-20 2008-06-25 佳能株式会社 能够识别大点区域和小点区域的图像处理设备
CN101583978A (zh) * 2007-05-15 2009-11-18 Lgn-Sys株式会社 媒介识别装置及采用其区分媒介类型的方法
US20090325640A1 (en) * 2008-04-09 2009-12-31 Ven Chava System and Method for Multimedia Storing and Retrieval Using Low-Cost Tags as Virtual Storage Mediums

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100452077C (zh) * 2004-03-04 2009-01-14 夏普株式会社 二维代码区域提取方法及其提取装置和电子装置
CN100377167C (zh) * 2006-03-17 2008-03-26 北京紫光捷通科技有限公司 一种用于二维码识别的二维码区域精确定位方法
CN101916387B (zh) * 2010-08-11 2012-09-26 河北工业大学 一种三维条形码标签及其制作方法
CN102542303A (zh) * 2010-12-24 2012-07-04 富士通株式会社 生成用于检测图像中的特定对象的分类器的装置和方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040112962A1 (en) * 2000-12-20 2004-06-17 Farrall Andrew John Security, identificaiton and verification systems
CN101207681A (zh) * 2006-12-20 2008-06-25 佳能株式会社 能够识别大点区域和小点区域的图像处理设备
CN101583978A (zh) * 2007-05-15 2009-11-18 Lgn-Sys株式会社 媒介识别装置及采用其区分媒介类型的方法
US20090325640A1 (en) * 2008-04-09 2009-12-31 Ven Chava System and Method for Multimedia Storing and Retrieval Using Low-Cost Tags as Virtual Storage Mediums

Also Published As

Publication number Publication date
CN104463292B (zh) 2018-01-09
CN104463292A (zh) 2015-03-25

Similar Documents

Publication Publication Date Title
WO2015035702A1 (fr) Procédé anti-contrefaçon et dispositif mobile
WO2015035701A1 (fr) Etiquette anti-contrefaçon, son procédé de fabrication et procédé anti-contrefaçon
WO2020226316A1 (fr) Appareil de transfert et procédé de fabrication d'un afficheur à micro-del l'utilisant
WO2016017975A1 (fr) Procédé de modification d'une image consistant à photographier un élément limité, et dispositif et système pour réaliser le procédé
WO2015133699A1 (fr) Appareil de reconnaissance d'objet, et support d'enregistrement sur lequel un procédé un et programme informatique pour celui-ci sont enregistrés
WO2019182307A1 (fr) Module de caméra et dispositif optique le comprenant
WO2020117006A1 (fr) Système de reconnaissance faciale basée sur l'ai
WO2015035705A1 (fr) Procédé de reconnaissance optique et dispositif mobile
WO2014058086A1 (fr) Dispositif de traitement d'image et procédé de traitement d'image
WO2018166091A1 (fr) Procédé, système et terminal de signature de prêt en face à face, et support d'enregistrement lisible par ordinateur
WO2021049827A1 (fr) Dispositif électronique pour déterminer l'emplacement d'un dispositif électronique externe et procédé associé
WO2022050507A1 (fr) Procédé et système de surveillance d'un module de génération d'énergie photovoltaïque
WO2019146812A1 (fr) Système de mise à jour de véhicule et procédé de commande
WO2020101420A1 (fr) Procédé et appareil de mesurer des caractéristiques optiques d'un dispositif de réalité augmentée
WO2020116680A1 (fr) Système et procédé de détection et de reconnaissance de plaque d'immatriculation de véhicule
WO2013022226A4 (fr) Procédé et appareil de génération d'informations personnelles d'un client, support pour leur enregistrement et système pos
WO2019164290A1 (fr) Procédé d'authentification biométrique utilisant une pluralité de caméras avec différents champs de vision et appareil électronique associé
WO2019164281A1 (fr) Dispositif électronique et son procédé de commande
WO2023033364A1 (fr) Dispositif d'affichage et appareil électronique le comprenant
WO2021158058A1 (fr) Procédé pour fournir un filtre et dispositif électronique le prenant en charge
WO2016099165A1 (fr) Capteur d'image, dispositif d'acquisition d'image le comprenant, et terminal portable comprenant le dispositif
WO2018199663A1 (fr) Procédé et dispositif de correction d'image en réponse à une perspective
WO2015035704A1 (fr) Procédé de reconnaissance optique et dispositif mobile
WO2017026651A1 (fr) Procédé de commerce électronique
WO2015035703A1 (fr) Procédé anti-contrefaçon et dispositif mobile

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13893588

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13893588

Country of ref document: EP

Kind code of ref document: A1