WO2018103756A1 - 组合二维码防伪系统和方法、组合二维码、识读装置 - Google Patents

组合二维码防伪系统和方法、组合二维码、识读装置 Download PDF

Info

Publication number
WO2018103756A1
WO2018103756A1 PCT/CN2017/115344 CN2017115344W WO2018103756A1 WO 2018103756 A1 WO2018103756 A1 WO 2018103756A1 CN 2017115344 W CN2017115344 W CN 2017115344W WO 2018103756 A1 WO2018103756 A1 WO 2018103756A1
Authority
WO
WIPO (PCT)
Prior art keywords
dimensional code
information
verification
combined
dot matrix
Prior art date
Application number
PCT/CN2017/115344
Other languages
English (en)
French (fr)
Inventor
沈维
王四平
Original Assignee
北京大码技术有限公司
北京西阁万投资咨询有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京大码技术有限公司, 北京西阁万投资咨询有限公司 filed Critical 北京大码技术有限公司
Publication of WO2018103756A1 publication Critical patent/WO2018103756A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce

Definitions

  • the invention relates to a combined two-dimensional code anti-counterfeiting system and method, a combined two-dimensional code and a reading device, in particular to verifying the authenticity of an article by using a two-dimensional code.
  • the two-dimensional code is widely used for authenticity verification of articles due to its ease of manufacture and low cost.
  • the user can scan the QR code with the mobile phone and other reading devices, and then automatically link to the verification website. Enter the verification number on the website page and the database.
  • the data is compared to verify the authenticity of the item. Since the forgery of the two-dimensional code is very easy, in order to improve the anti-counterfeiting performance, the password processing is usually performed. For example, if the overlay layer is set on the verification number, the overlay layer needs to be scraped to see the verification number.
  • the anti-counterfeiting of the code requires the cooperation of the user. If the user does not know that there is an overlay layer in advance, there is no recognition capability for the forged two-dimensional code, and the true and false two-dimensional code cannot be distinguished. That is, the existing verification method has the following disadvantages: 1) the user is inconvenient to use, the user needs to manually input the number, which is easy to make mistakes; 2) the fraud of the system, there is no anti-counterfeiting ability, that is, the two-dimensional code, the verification number, the website address fraud, the user is not easy see through.
  • the inventor of the present application discloses a transcoding technique in which the two-dimensional code is at least partially covered such that the overlay layer is at least partially removed, and the pre-dimensional code cannot be read and decoded, in the authorization bulletin number CN101615258B (application number: 200810115748.0). To achieve anti-counterfeiting purposes.
  • An anti-counterfeiting technique using a barcode is disclosed in the publication 1 (Patent Publication No. CN102270294).
  • the QR code and barcode are affixed to different locations in the item or package.
  • a part of the information in the two-dimensional code is encrypted to form hidden information, so that the plaintext information is incomplete, and the key for encryption is incorporated into the barcode.
  • the hidden information can be decoded by decoding the key in the barcode with a barcode decoding tool.
  • the user judges the authenticity based on whether the hidden information and the plaintext information constitute a complete information. However, judging the relevance of the two from the content depends on the user's experience, and it is easy to make judgment errors, and the anti-counterfeiting effect varies from person to person.
  • the object of the present invention is to solve the above problems of the prior art, and to further improve the anti-counterfeiting strength while facilitating the use of the user, making the fraud difficult to achieve.
  • the second objective is to solve the problem that the information utilization rate is not high in the existing anti-counterfeiting technology, realize one-code multi-use, and reduce the anti-counterfeiting cost.
  • a first technical solution of the present invention is a combined two-dimensional code anti-counterfeiting system, which comprises combining a two-dimensional code (300), a reading device (400), verification software (403, 404), a network (500), and a database ( 600), server (700),
  • the combined two-dimensional code includes a two-dimensional code (30) and a dot matrix (100), at least information related to the verification software is incorporated in the two-dimensional code (30), and the password is encoded in the dot matrix (100) Information, the surface of the lattice (100) is covered by the overlay layer, and the lattice (100) cannot be decoded until the overlay is at least partially removed.
  • the reading device (400) is configured to decode the two-dimensional code (30) in the combined two-dimensional code, and guide, download or start the verification software (403, 404) by the information related to the verification software, and verify the verification The results are displayed,
  • the verification software (403, 404) is downloaded by the network (500) to the reading device (400) for decoding the dot matrix (100) after at least partially removing the overlay layer, And combining the decoded password information or the password information with the information in the two-dimensional code (30) into verification information,
  • the database (600) determines the authenticity of the combined two-dimensional code based on the verification information.
  • the second technical solution is based on the first technical solution, characterized in that the database (600) is downloaded by the network (500) to the reading device (400), and the verification information is locally verified.
  • the third technical solution is based on the second technical solution, characterized in that the information programmed into the two-dimensional code (30) comprises: information for guiding the download verification software and information for constructing the information for verification.
  • the fourth technical solution is based on the third technical solution, characterized in that the information for setting the verification information is changed information, including any one or combination of the item's logistics code, product serial number, and product batch.
  • the fifth technical solution is based on the fourth technical solution, characterized in that the database (600) counts the number of times of verification, and the count value is displayed as a verification result by the reading means (400).
  • the sixth technical solution is based on any one of the first to fifth aspects, characterized in that the verification software (403, 404) generates the verification information in a manner of changing information composition.
  • the seventh technical solution is based on any one of the first to fifth aspects, characterized in that the password information programmed into the dot matrix (100) is changed information.
  • the eighth technical solution is a reading device, which comprises: combining a two-dimensional code reading module (401), a two-dimensional code decoding module (402), a networking module (405), a display module (406), and installing the verification software. Also having a dot matrix decoding module (403) and a verification data generating module (404),
  • the combined two-dimensional code reading module (401) is configured to read the combined two-dimensional code (300).
  • the two-dimensional code decoding module (402) is configured to decode the two-dimensional code (30) in the combined two-dimensional code (300), and guide, download or start the verification software (403, 404) by the information related to the verification software. ;
  • the dot matrix decoding module (403) is configured to decode the dot matrix (100) in the two-dimensional code 300 after at least partially removing the overlay (200) covering the surface of the dot matrix (100);
  • the verification data generating module (404) combines the information related to the verification in the two-dimensional code (30) with the password information in the dot matrix (100) into the verification information;
  • the networking module (405) is configured to connect to a server and a database
  • the display module (406) is configured to display decoding information and verification results of the two-dimensional code (30).
  • a ninth technical solution is a combined two-dimensional code anti-counterfeiting method, characterized in that it comprises the following steps, step 1,
  • Step 1 Read the combined two-dimensional code (300) pasted, printed or printed on the item to be verified or the outer package.
  • Step 2 decoding the two-dimensional code (30) in the combined two-dimensional code (300). At this time, the dot matrix (100) is covered by the overlay layer and cannot be read.
  • Step 3 displaying decoding information of the two-dimensional code (30),
  • Step 4 booting from the information in the decoded information, downloading the verification software,
  • Step 5 removing at least part of the overlay layer, enabling the bitmap (100) to decode and obtain
  • Step 6 decoding the dot matrix (100),
  • step 7 the information in the two-dimensional code is combined with the information in the dot matrix to generate verification information, and the verification information is sent to the database (600).
  • Step 8 The database (600) compares the verification information with the string stored in the database, performs verification, and simultaneously counts the number of verifications.
  • step 9 the number of times the result of the verification is displayed.
  • the tenth technical solution is a combined two-dimensional code, which is used in any one of the first to nine-ninth aspects, characterized in that the two-dimensional code (30) and the lattice (100), the lattice (100) and the two-dimensional
  • the code (30) remains associated with the graphic, and the setting area (40) of the dot matrix (100) is located in or outside the graphic of the two-dimensional code (30).
  • the size of the setting area (40) is referred to.
  • the error correction level of the two-dimensional code (30) is set such that the sum of the error rate caused by the lattice (100) and the error rate of the two-dimensional code itself is smaller than the error correction rate of the two-dimensional code, and the two-dimensional code is guaranteed (
  • the decoding of 30) is not affected, at least the information related to the verification software is incorporated in the two-dimensional code (30), the password information is programmed in the dot matrix (100), and the dot matrix (100) has the same
  • the two-dimensional code (30) has the same or different error correction rate.
  • An eleventh technical solution of the present invention is based on the tenth technical solution, characterized in that the shape, the size, the spacing and the position of the module in the lattice (100) and the shape of the module in the two-dimensional code (30) The size, spacing and position are the same, and when the dot matrix (100) is embedded in the two-dimensional code (30), it is visually identical to the module of the surrounding two-dimensional code (30).
  • 1 is an explanatory diagram of a composition of a combined two-dimensional code (the cover layer is not covered);
  • FIG. 2 is a structural explanatory diagram of a combined two-dimensional code (covered with a cover layer);
  • Figure 3 is an explanatory view showing a modification of the combined two-dimensional code of Figure 1;
  • Figure 4 is an explanatory view showing another modification of the combined two-dimensional code of Figure 1;
  • FIG. 5 is a block diagram showing another configuration of a combined two-dimensional code
  • Figure 6 is an explanatory view showing a modification of the combined two-dimensional code of Figure 4.
  • Figure 7 is an explanatory view showing another modification of the combined two-dimensional code of Figure 4.
  • Figure 8 is an explanatory view of a combined two-dimensional code with a positioning mechanism
  • FIG. 9 is a structural block diagram of an anti-counterfeiting system combining two-dimensional codes
  • FIG. 10 is a flow chart of a method for combining two-dimensional code anti-counterfeiting.
  • FIG. 1 and 2 are explanatory views of the configuration of the combined two-dimensional code of the present invention. 1 is an explanatory view in which a cover layer is not provided; and FIG. 2 is an explanatory view in which a cover layer is provided.
  • the combined two-dimensional code is composed of two parts of the two-dimensional code 30 and the lattice 100.
  • the setting area 40 of the lattice 100 is located at the lower right of the two-dimensional code 30 (ie, the position where the graphic is not positioned) by the two-dimensional code.
  • the three positioning patterns 31 of 30 are positioned at the side edges, and are associated with the two-dimensional code 30 on the graph.
  • the rectangular setting area 40 is divided into 4*16 modules for encoding, and the dark dot matrix 100 and the white part constitute two states of binary information, one dark dot and corresponding size.
  • the white parts respectively represent one bit, and a certain gap is maintained between adjacent dots in the dot matrix 100 to avoid being connected to each other to improve image processing efficiency and visual effect. Since the shape of the dot matrix 100 is different from the shape of the rectangular module in the two-dimensional code 30, the dot matrix 100 also functions as a combination of the two-dimensional code.
  • the size of the setting area 40 of the dot matrix 100 is set with reference to the error correction level (error correction capacity) of the two-dimensional code 30 so that the sum of the error rate caused by the lattice 100 and the error rate of the two-dimensional code itself is smaller than two-dimensional.
  • the error correction rate of the code ensures that the decoding of the two-dimensional code 30 is not affected.
  • the information incorporated into the dot matrix 100 also affects the bit error rate of the two-dimensional code, so as to avoid the change of the programmed information, resulting in two-dimensional
  • the code 30 cannot be decoded occurs, and when the size of the setting area 40 is set according to the error correction level, a complete margin is left, which can be determined experimentally. If an extreme case is selected according to the distribution of the module, the upper limit value of the set area is determined, and the size of the specific set area is determined within the upper limit value.
  • authorization number CN101615258B application number: 200810115748.0
  • the aspect ratio and shape of the setting area 40 can be arbitrarily set, and the dot matrix 100 can also be partially located outside the image area of the two-dimensional code 30 to increase the information capacity of the dot matrix 100.
  • the size of the setting area 40 is associated with the error correction level, the size of the setting area 40 can be automatically adjusted according to the error correction level of the two-dimensional code 30 when the combined two-dimensional code is compiled; when reading, the two-dimensional code 30 can be utilized.
  • the parameters such as the version and the error correction level determine the readout area of the dot matrix 100 to facilitate information processing.
  • the dot matrix 100 can also be replaced by the shape of a text or other pattern without using the shape of a black dot, as long as it can be recognized as a separate module.
  • the dots in the lattice 100 can also be the same size and shape as the modules in the two-dimensional code 30.
  • the QR code 30 is a QR code using the national standard (GB/T18284-2000), and any standard encoding device and reading device can be produced and decoded.
  • the surface of the dot matrix 100 is as shown in FIG. 2, and a cover layer 200 is formed.
  • the cover layer 200 may be a scratch ink, a sticker, a laser film, or the like.
  • the information programmed in the lattice 100 also has an error correction function, and the lattice 100 is at least partially covered by the overlay layer 200, so that the lattice 100 after the overlay cannot be read, that is, the lattice 100 caused by the overlay is covered.
  • the error rate is greater than the error correction rate, and the overlay 200 is limited to the dot matrix 100 and does not affect the reading of the two-dimensional code 30.
  • the dot matrix 100 can be read, that is, as long as the partial overlay 200 is removed, the bit error rate of the lattice 100 is less than the error correction rate, and the dot matrix 100 can be read. .
  • the data information encoded in the two-dimensional code 300 includes characters, numbers, characters, web addresses, graphics, images, animations, and the like, or a combination thereof; the password information is encoded in the dot matrix 100, including characters, numbers, and the like. In the embodiment, the following information is incorporated.
  • the number in the first line is the logistics code of the item, the product serial number or the product batch.
  • the second line is an indication to download the verification software.
  • the cipher information compiled in the dot matrix 100 in which the two-dimensional code 1 is combined is as follows, and the cipher information is a secret algorithm.
  • the number (logistics code, etc.) in the two-dimensional code 30 and the password information of the dot matrix 100 constitute verification information.
  • the reading terminal such as a smartphone can only read the information in the two-dimensional code 30, and the user can verify the log code, the product serial number, the product batch, and the like. Under the guidance of the decoding information, the reading terminal downloads the “Abbott Milk Powder” verification software automatically or by manually clicking the link to the corresponding website.
  • the "Abbott Milk Powder" verification software downloaded in the reading terminal decodes the password information of the dot matrix 100, and the number 234734631212 (logistics code) in the two-dimensional code 30 and the dot matrix 100
  • the number 963215 is combined into verification information, verified by database or local to determine the authenticity of the two-dimensional code, and verify the authenticity of the item.
  • FIG. 3 is a modification of FIG. 1.
  • the installation area 40 of the dot matrix 100 is provided in an elliptical shape.
  • a cover layer (not shown) is also provided in the dot matrix 100, and other structures are not provided. change.
  • FIG. 4 is a modification of FIG. 1.
  • the arrangement area of the dot matrix 100 is composed of two differently disposed regions 40a and 40b at different positions.
  • the dot matrix 100 is also provided.
  • Cover layer (not shown), the overlay layer can be set to one of the setting areas, or both setting areas can be set, as long as the layer is guaranteed to be at least partially removed before decoding. Other structures remain unchanged.
  • FIG. 5 is a block diagram showing another configuration of a combined two-dimensional code.
  • the setting area 50 of the dot matrix 100 is composed of 50a, 50b, 50c, and 50d, and each of the setting areas is located in each of the two-dimensional code 30 patterns.
  • the lattice 100 On the outside of the side, the lattice 100 has a polygonal single row structure.
  • the installation regions 50a, 50b, 50c, 50d are positioned by the positioning pattern 31 of the two-dimensional code 30, and are spaced apart from the sides.
  • the size of the set area 50 is kept in association with the size of the two-dimensional code 30.
  • a cover layer (not shown) is also provided in each dot matrix or partial dot matrix to ensure that the cover layer cannot be decoded until it is at least partially removed.
  • FIG. 6 is a modification of FIG. 5.
  • the setting area of the dot matrix 100 is changed from the four groups in FIG. 5 to the left and right groups, and two rows of lattices 100 are arranged in each setting area, and the total information capacity of the dot matrix is set.
  • FIG. 7 is a modification of FIG. 5.
  • the setting area of the dot matrix 100 is changed from four groups in FIG. 5 to the right group, and four rows of lattices 100 are arranged in the setting area, and the total information capacity and map of the dot matrix are shown. 4 is the same. Including the cover layer (not shown), the other parts are the same as the structure in FIG.
  • FIG. 8 is a modification of FIG. 5.
  • three dot positioning patterns 51 are provided outside the dot matrix 100, and are respectively located outside the three positioning patterns 31 of the two-dimensional code 30.
  • the position and extent of the lattice 100 is determined by three dot positioning patterns 51.
  • the dot patterning pattern 51 has a specific shape for reading by an image input device or an electrophotographic scanning device.
  • the dot matrix positioning pattern 51 also functions as a combination of the two-dimensional code range to facilitate the determination of the scanning range.
  • the cover layer is omitted in FIG. 8, and as in FIG. 5, the surface of the dot matrix 100 is also provided with a cover layer.
  • 3 to 8 are only used to illustrate the deformation structure of the combined two-dimensional code.
  • the information encoded in the two-dimensional code and the lattice in FIG. 1 is also incorporated into the two-dimensional code and the dot matrix of each figure, and The surface of the dot matrix 100 is provided with a cover layer having a bit error rate larger than the error correction rate, and has the same effect as that of FIG.
  • FIG. 9 is a structural block diagram of an anti-counterfeiting system combining two-dimensional codes.
  • a combined two-dimensional code 300 As shown, there is a combined two-dimensional code 300, a reading terminal 400, a network 500, a database 600, and a server 700.
  • the combined two-dimensional code 300 is the combined two-dimensional code shown in FIG. 2, and the information compiled in the combined two-dimensional code 300 is the same as the previous one, that is, the information compiled in the two-dimensional code 30 is as follows:
  • the password information programmed in the dot matrix 100 is as follows.
  • the reading terminal 400 is composed of a smart phone having a two-dimensional code reading function, and includes a combined two-dimensional code reading module 401, a two-dimensional code decoding module 402, a networking module 405, and a display module 406.
  • the dot matrix decoding module 403 and the verification data generating module 404 are also provided by installing the "Abbott Milk Powder" APP verification software.
  • the combined two-dimensional code reading module 401 is for reading a combined two-dimensional code 300 pasted, printed or printed on the item to be verified or the outer package.
  • the two-dimensional code decoding module 402 is configured to decode the two-dimensional code 30 in the combined two-dimensional code 300; the lattice decoding module 403 is configured to decode the dot matrix 100 in the two-dimensional code 300; the verification data generating module 404 will use the two-dimensional code
  • the verification-related information in 30 is combined with the password information in the matrix 100 into verification information for verification of the authenticity of the two-dimensional code (item); the networking module 405 is used to connect with the server 700 and the database 600; and the display module 406 It is used to display the decoding information and the verification result of the two-dimensional code 30.
  • the network 500 is used for the decoding terminal 400 to connect to the database 600 and the server 700.
  • the database 600 is used to verify the authenticity of the item, and has a verification module 601 and a counting module 602.
  • the server 700 provides an authentication APP (verification software) download.
  • Fig. 10 is a flow chart showing a method of combining two-dimensional code anti-counterfeiting.
  • the combined two-dimensional code is pasted, printed or printed on the surface or outer package of the article, and the combined two-dimensional code 300 is captured by the mobile phone on which the reading terminal 400 is mounted. As shown in Figure 10,
  • Step 1 The combined two-dimensional code reading module 401 reads the combined two-dimensional code 300 pasted, printed or printed on the item to be verified or the outer package.
  • step 2 the two-dimensional code decoding module 402 decodes the two-dimensional code 30 in the combined two-dimensional code 300 to obtain the following information.
  • the dot matrix 100 is covered by the overlay layer and cannot be read and decoded.
  • step 3 the display module 406 displays the information.
  • Step 4 Download and install the “Abbott Milk Powder” APP verification software, and generate a dot matrix decoding module 403 and a verification data generation module 404 in the reading terminal 400.
  • Step 5 remove at least part of the overlay layer, enable the lattice 100 to decode, and shoot again
  • the two-dimensional code 300 is combined.
  • step 6 the dot matrix decoding module 403 decodes the pair of lattices 100 in the two-dimensional code 300 to obtain password information 963215.
  • step 7 the verification data generation module 404 combines the number 234734631212 in the two-dimensional code with the 963215 in the dot matrix to generate verification information (number) 234734631212963215.
  • the verification is sent by the network 500 to the database 600.
  • step 8 the verification module 601 in the database 600 compares the verification number with the character string stored in the database to perform verification, and the counting module 602 counts the number of verifications. The result of the verification and the number of verifications are transmitted to the reading terminal 400 via the network 500.
  • step 9 the display module 406 in the reading terminal 400 displays the result of the verification and the number of verifications. That is, when the string matches the string in the database, the display verification passes, and if the comparison is inconsistent, the verification fails, and the number of verifications (queries) is prompted.
  • the information encoded in the two-dimensional code 30 is the following web page link, and the logistics code is omitted:
  • the following password information is programmed in the dot matrix 100:
  • the reading terminal 400 When the reading terminal 400 reads the two-dimensional code 300 and decodes it, it directly links to the Internet and enters the webpage specified by the above link.
  • the modification is the same as the embodiment except that there is no logistics information.
  • the anti-counterfeiting system and the verification method for combining the two-dimensional codes are described above.
  • the dot matrix 100 is introduced in the ordinary two-dimensional code 30 (QR code), the surface of the dot matrix 100 is at least partially covered, and the password information incorporated in the dot matrix 100 is kept secret.
  • the algorithm performs encryption processing, which greatly increases the difficulty of system fraud.
  • the information compiled in the two-dimensional code 30 is only information for guiding downloading or starting the verification software, and the decoding of the dot matrix 100 and the formation of the verification information are completed by the verification software, which improves the system fraud by forging the two-dimensional code and the website. Difficulty.
  • the original information forming the verification information includes constantly changing information such as the logistics code, the product serial number or the product batch, the two-dimensional code 30 graphics (code map) of different articles or batches are different, that is, due to The pattern of the two-dimensional code of different items or batches changes (graphic variable code), and it is impossible to falsify by copying the two-dimensional code, which further increases the difficulty of fraud.
  • the verification number is composed of the log code, the product serial number, the product lot, and the password information in the dot matrix 100 in the two-dimensional code.
  • the password information in the dot matrix 100 is directly used for verification.
  • the verification is performed in the database.
  • the string in the database is simultaneously downloaded to the reading terminal, and the local authentication is directly performed in the reading terminal, and the connection with the database is omitted.
  • the numbers in the two-dimensional code 30 and the passwords in the dot matrix 100 are directly connected to form verification data, and the data of the two-dimensional code 30 is made by using changes in information such as the logistics code, the product serial number, and the product batch.
  • the variable code in the modified example, the variable code module is added, and the information encoded in the two-dimensional code 30 is changed by the variable code module.
  • the information programmed into the lattice 100 is invariant, but the lattice 100 may also employ a pattern change code because the lattice 100 is at least partially covered, and the lattice 100 cannot be partially before the cover layer is at least partially removed. Being read, played a role in anti-counterfeiting.
  • the graphic code of the two-dimensional code 30 and the dot matrix 100 may be used alone or in combination.
  • the information for verification is directly combined with the information in the two-dimensional code 30 and the password information in the dot matrix 100, but some of them may be combined into the information for verification.
  • the information for generating the two-dimensional code 30 and the dot matrix 100 is stored in a database for verification, and the log code, product number, product lot, etc., which are incorporated into the two-dimensional code 30 as the verification information, are used.
  • the password information compiled into the dot matrix 100, and the algorithms constituting the information for verification are stored in the database.
  • the dark color module of the lattice 100 is a dot different from the shape of the rectangular module in the two-dimensional code 30.
  • the shape, size, pitch, and position of the module in the lattice 100 The shape, size, spacing and position of the module in the two-dimensional code 30 are the same. Therefore, the graphic of the lattice 100 not only covers part of the two-dimensional code 30, but the module of the matrix 100 is visually related to the two-dimensional code 30.
  • the modules are consistent and play the role of hiding the dot matrix 100 graphics.
  • a blank portion for embedding the dot matrix 100 may be generated in advance at the time of generation. Since no blank module exists in the blank portion, the dot matrix 100 does not block the module of the two-dimensional code 30 when the blank portion is embedded in the blank portion.
  • the error code at the time of reading the code 30 can reduce the error correction level of the two-dimensional code 30 and increase the decoding operation speed as compared with the case where the error correction capability of the error correction capability of the two-dimensional code is used to cause error.

Landscapes

  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Credit Cards Or The Like (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

一种组合二维码防伪系统、组合二维码、识读装置及方法。步骤1,读取粘贴、印刷或打印在待验证物品或外包装上的组合二维码300(S1)。步骤2,对组合二维码300中的二维码30解码(S2)。步骤3,显示该信息(S3)。步骤4,由解码信息引导,下载验证软件(S4)。步骤5,移除至少部分覆盖在点阵11表面的覆盖层(S5)。步骤6,下载的验证软件对二维码300中的点阵100解码(S6)。步骤7,将二维码中的数字与点阵中的数字结合起来,生成验证用数字。该验证用数字由网络500发送数据库601(S7)。步骤8,数据库600对验证用数字进行验证,同时对验证的次数进行计数(S8)。步骤9,显示验证的结果和验证次数(S9)。

Description

组合二维码防伪系统和方法、组合二维码、识读装置 技术领域
本发明涉及组合二维码防伪系统和方法、组合二维码、识读装置,尤其涉及利用二维码对物品的真伪进行验证。
背景技术
二维码由于制作容易、成本低被广泛用于物品的真伪验证。将编有网址的二维码粘贴、印刷在物品或包装表面,用户用手机等识读设备扫描二维码,即可自动链接到验证网站,在网站的页面上输入验证数字即可与数据库中的数据进行对比,对物品的真伪进行验证。由于二维码的伪造非常容易,为提高防伪性能,通常还进行暗码处理,如在验证数字上设置覆盖层,需要刮取覆盖层才能看到验证数字。
但是利用暗码的防伪,需要用户的配合,如果用户预先不知道有覆盖层,对伪造的二维码就没有识别能力,无法区分真假二维码。即,现有的验证方法有以下缺点:1)使用不便,用户需要手动输入数字,容易出错;2)对系统的造假,没有防伪能力,即二维码、验证数字、网址一起造假,用户不易识破。
本申请的发明人在授权公告号CN101615258B(申请号:200810115748.0)公开了一种变码技术,该二维码被至少部分覆盖,使得覆盖层被至少部分去除前二维码不能被识读解码,达到防伪目的。
这种方法虽然提高了用户方便性问题,但由于绝大部分二维码都是采用公开算法,容易被系统伪造,即二维码、网址一同的造假,用户不易识破,防伪漏洞依然存在。
公开文献1(公开号CN102270294的专利公开文件)中公开了利用条形码的防伪技术。二维码和条形码分别粘贴在物品或包装的不同位置。二维码中的一部分信息做加密处理形成隐藏信息,使明文信息不完 整,加密用的密钥编入条形码中。用条形码解码工具对条形码中的密钥解后,才能解码隐藏信息。用户根据隐藏信息与明文信息是否构成一个完整的信息,来判断真伪。但从内容上判别两者的关联性依赖于用户的经验,容易出现判断错误,防伪效果因人而异。
发明内容
本发明的目的在于解决上述现有技术的问题,在方便用户使用的同时,进一步提高防伪强度,使得造假难以实现。
第二目的在于解决现有的防伪技术中信息利用率不高的问题,实现一码多用,降低防伪成本。
本发明的第一技术方案为组合二维码防伪系统,其特征在于包括,组合二维码(300)、识读装置(400)、验证软件(403、404)、网络(500)、数据库(600)、服务器(700),
所述组合二维码包括二维码(30)和点阵(100),所述二维码(30)中至少编入与验证软件相关的信息,所述点阵(100)中编入密码信息,所述点阵(100)的表面被覆盖层所覆盖,在覆盖层被至少部分移除之前,点阵(100)无法解码,
所述识读装置(400)用于对所述组合二维码中的二维码(30)解码,并由与验证软件相关的信息引导,下载或启动验证软件(403、404),对验证的结果进行显示,
所述验证软件(403、404)由所述网络(500)下载到所述识读装置(400),用于在将所述覆盖层至少部分移除后对所述点阵(100)解码,并将解码的密码信息或所述密码信息与所述二维码(30)中的信息结合成验证用信息,
数据库(600)根据所述验证用信息判断所述组合二维码的真伪。
第二技术方案基于第一技术方案,其特征在于,所述数据库(600)由所述网络(500)下载到所述识读装置(400),对所述验证用信息进行本地验证。
第三技术方案基于第二技术方案,其特征在于,编入所述二维码(30)的信息包括:引导下载验证软件的信息和用于组建验证用信息的信息。
第四技术方案基于第三技术方案,其特征在于,用于组建验证用信息的信息为变动的信息,包括物品的物流码、产品序号、产品批次中的任何一个或组合。
第五技术方案基于第四技术方案,其特征在于,数据库(600)对验证的次数进行计数,计数值作为验证结果由所述识读装置(400)显示。
第六技术方案基于第一至五中任一项技术方案,其特征在于,验证软件(403、404)采用改变信息组成的方式生成所述验证用信息。
第七技术方案基于第一至五中任一项技术方案,其特征在于,编入所述点阵(100)的密码信息为变动的信息。
第八技术方案为识读装置,其特征在于包括,组合二维码读取模块(401)、二维码解码模块(402)、联网模块(405)、显示模块(406),通过安装验证软件还具有点阵解码模块(403)、验证数据生成模块(404),
所述组合二维码读取模块(401)用于读取组合二维码(300)。
所述二维码解码模块(402)用于对组合二维码(300)中的二维码(30)解码,并由与验证软件相关的信息引导,下载或启动验证软件(403、404);
所述点阵解码模块(403)用于在至少部分移除覆盖在点阵(100)表面的覆盖层(200)后,对二维码300中的点阵(100)解码;
所述验证数据生成模块(404)将二维码(30)中与验证相关的信息与点阵(100)中的密码信息结合成验证用信息;
所述联网模块(405)用于与服务器和数据库连接;
所述显示模块(406)用于显示二维码(30)的解码信息和验证结果。
第九技术方案为组合二维码防伪方法、其特征在于,包括以下步骤, 步骤1,
步骤1,读取粘贴、印刷或打印在待验证物品或外包装上的组合二维码(300)。
步骤2,对组合二维码(300)中的二维码(30)解码,此时,点阵(100)被覆盖层覆盖,无法读取,
步骤3,显示二维码(30)的解码信息,
步骤4,由解码信息中的信息引导,下载验证软件,
步骤5,移除至少部分覆盖层,使点阵(100)能够解码,并获取
点阵(100)的图像,
步骤6,对点阵(100)解码,
步骤7,将二维码中的信息与点阵中的信息结合起来,生成验证用信息,该验证用信息发送到数据库(600)。
步骤8,数据库(600)将验证用信息与存储在数据库中的字符串做对比,进行验证,同时、对验证的次数进行计数,
步骤9,显示验证的结果的次数。
第十技术方案为组合二维码,用于第一至九9中任一项技术方案,其特征在于包括,二维码(30)和点阵(100),点阵(100)与二维码(30)在图形上保持关联,点阵(100)的设置区域(40)位于所述二维码(30)的图形内或图形外,位于图形内时,设置区域(40)的大小参照二维码(30)的纠错等级设定,以使点阵(100)引起的误码率与二维码本身的误码率之和小于二维码的纠错率,保证二维码(30)的解码不受影响,所述二维码(30)中至少编入与验证软件相关的信息,所述点阵(100)中编入密码信息,所述点阵(100)具有与所述二维码(30)相同或内不同的纠错率。
本发明的第十一技术方案基于第十技术方案,其特征在于,所述点阵(100)中的模块的形状、大小、间距和位置与所述二维码(30)中的模块的形状、大小、间距和位置相同,所述点阵(100)嵌入所述二维码(30)中时,在视觉效果上与周边的所述二维码(30)的模块保持一致。
附图说明
图1为组合二维码的构成说明图(覆盖层未覆盖);
图2为组合二维码的构成说明图(覆盖有覆盖层);
图3为图1组合二维码的变形例说明图;
图4为图1组合二维码的另一变形例说明图;
图5为另一种组合二维码的构成说明图;
图6为图4组合二维码的变形例说明图;
图7为图4组合二维码的另一变形例说明图;
图8为带定位机构的组合二维码的说明图;
图9为组合二维码的防伪系统的结构框图;
图10为组合二维码防伪方法的流程图。
具体实施方式
以下通过具体实施方式对本发明的组合二维码防伪系统、识读装置及组合二维码进行说明。
首先对组合二维码进行说明。
图1、2是本发明的组合二维码的构成说明图。图1是未设覆盖层的说明图;图2是设置有覆盖层的说明图。
如图1所示,组合二维码由二维码30和点阵100两部分构成,点阵100的设置区域40位于二维码30的右下方(即没有定位图形的位置)由二维码30的3个定位图形31定位在两侧边位置,与二维码30在图形上保持关联。
在本实施方式中,矩形的设置区域40被划分成4*16个模块用于编码,深色的点阵100与白色部分构成二进制信息的两种状态,一个深色圆点和与之相应大小的白色部分分别代表一位,点阵100中相邻的圆点之间保持一定的间隙,避免互相连在一起,以提高图像处理效率和视觉效果。由于点阵100的形状与二维码30中的矩形模块形状不同,点阵 100还起到组合二维码的标识作用。
点阵100的设置区域40的大小参照二维码30的纠错等级(纠错容量)设定,以使点阵100引起的误码率与二维码本身的误码率之和小于二维码的纠错率,保证二维码30的解码不受影响。由于二维码30的误码率不仅受点阵区域40面积大小的影响,编入点阵100中的信息也会影响二维码的误码率,为避免编入信息的变化,造成二维码30无法解码的情况出现,在根据纠错等级设定设置区域40的大小时,留有完全余量,具体可通过实验确定。如根据模块的分布选择一种极端情况,确定设置区域的上限值,在上限值以内确定具体设置区域的大小。具体也可参照本发明的发明人在授权公告号CN101615258B(申请号:200810115748.0)中公开的技术确定,在此不再赘述。
设置区域40的长宽比以及形状可以任意设置,点阵100也可以一部分位于二维码30的图像区域外,以提高点阵100的信息容量。
由于设置区域40的大小与纠错等级关联,在编制组合二维码时能够根据二维码30的纠错等级自动调整设置区域40的大小;在识读时,能够利用二维码30中的版本、纠错等级等参数,确定点阵100的读出区域,方便信息处理。
点阵100也可不采用黑圆点的形状,用文字或其他图案的形状代替,只要能作为一个单独的模块被识别即可。点阵100中的圆点也可以采用与二维码30中的模块相同大小和形状。
二维码30为采用国家标准(GB/T18284-2000)的QR码,任何标准的编码设备和识读设备均能制作和解码。
点阵100的表面如图2所示,形成有覆盖层200,覆盖层200可以是刮刮墨、不干胶贴、激光贴膜等。
与二维码30相同,点阵100中编入的信息也具有纠错功能,点阵100至少被覆盖层200部分覆盖,使得覆盖后点阵100不能被识读,即覆盖引起的点阵100的误码率大于纠错率,该覆盖层200只限于点阵100,不影响二维码30的识读。当覆盖层200被至少部分移除后,该点阵100可以被识读,即只要移除部分覆盖层200,使点阵100的误码率 小于其纠错率,点阵100即可识读。
二维码300中编入数据信息包括:字符、数字、文字、网址、图形、图像、动画等,或它们的组合;点阵100中编入密码信息,包括:字符、数字等。在实施方式中,编入以下的信息。第一行的数字是物品的物流码,产品序号或产品批次。第二行是下载验证软件的指示。
编入二维码30的信息:
·234734631212
·下载“雅培奶粉”APP验证。
在组合二维码1的点阵100中编入的密码信息如下,密码信息采用保密算法。
·963215。
二维码30中的数字(物流码等)与点阵100的密码信息组成验证用信息。
因此,覆盖层200未移除时,智能手机等识读终端只能识读二维码30中的信息,用户可以验证物流码、产品序号、产品批次等。识读终端在解码信息的引导下,自动或通过手动点击链接到对应的网站,下载“雅培奶粉”验证软件。
在至少部分移除覆盖层200后,识读终端中下载的“雅培奶粉”验证软件对点阵100的密码信息进行解码,并将二维码30中的数字234734631212(物流码)与点阵100中的数字963215(密码信息)组合成验证用信息,通过数据库或本地验证,以确定二维码的真实性,对物品的真伪进行验证。
变形例
图3是图1的变形例,如图3所示,点阵100的设置区域40设置成椭圆形,与图2相同,点阵100中也设置有覆盖层(未图示),其他结构不变。
图4是图1的变形例,如图4所示,点阵100的设置区域有两个位于不同位置,不同形状的设置区域40a和40b组成,与图2相同,点阵100中也设置有覆盖层(未图示),覆盖层既可以设置其中的一个设置 区域,也可以两个设置区域都设置,只要保证覆盖层被至少部分移除前,无法解码即可。其他结构不变。
实施方式2
以下对另一种组合二维码的结构进行说明。
图5是另一种组合二维码的构成说明图,与图1不同的是点阵100的设置区域50由50a、50b、50c、50d组成,各设置区域分别位于二维码30图形的各侧边外侧,点阵100呈多边单排的结构。与图1的结构相同,设置区域50a、50b、50c、50d由二维码30的定位图形31定位,与侧边保持一定间隔。设置区域50的大小与二维码30的大小保持关联。由于点阵100不会影响二维码30的解码,设置区域50的范围不用与二维码30的纠错等级关联,可以设置更大的信息容量。与图2相同,各个点阵或部分点阵中也设置有覆盖层(未图示),保证覆盖层被至少部分移除前,无法解码。
图6是图5的变形例,图6中,点阵100的设置区域由图5中的四组改变成左右各一组,各个设置区域中设置两排点阵100,点阵的总信息容量与图4相同。包括设置覆盖层(未图示),其他部分与图5中的结构相同。
图7是图5的变形例,图7中,点阵100的设置区域由图5中的四组改变成右边一组,设置区域中设置四排点阵100,点阵的总信息容量与图4相同。包括设置覆盖层(未图示),其他部分与图5中的结构相同。
图8是图5的变形例,图8中,在点阵100的外侧设置三个点阵定位图形51,分别位于二维码30的三个定位图形31的外侧。通过三个点阵定位图形51确定点阵100的位置和范围。点阵定位图形51具有特定的形状,供图象输入设备或光电扫描设备读取。同时,点阵定位图形51还起到组合二维码范围的标识作用,方便确定扫描范围。图8中省略了覆盖层,与图5相同,点阵100的表面也设置有覆盖层。
图3至8仅用于说明组合二维码的变形结构,内容上,只要将图1中编入二维码和点阵的信息同样编入各图的二维码和点阵中,并在点阵 100的表面设置使误码率大于纠错率的覆盖层即可,与图1具有同样的效果。
以下对使用组合二维码进行物品防伪的组合二维码的防伪系统进行说明。
图9为组合二维码的防伪系统的结构框图。
如图所示,具有组合二维码300、识读终端400、网络500、数据库600、服务器700。
组合二维码300为图2所示的组合二维码,组合二维码300中编入的信息与之前的相同,即,二维码30中编入的信息如下:
·234734631212
·下载“雅培奶粉”APP验证。
点阵100中编入的密码信息如下,
·963215。
识读终端400由具有二维码识读功能的智能手机构成,包括组合二维码读取模块401、二维码解码模块402、联网模块405、显示模块406。通过安装“雅培奶粉”APP验证软件还具有点阵解码模块403、验证数据生成模块404。
组合二维码读取模块401用于读取粘贴、印刷或打印在待验证物品或外包装上的组合二维码300。
二维码解码模块402用于对组合二维码300中的二维码30解码;点阵解码模块403用于对二维码300中的点阵100解码;验证数据生成模块404将二维码30中与验证相关的信息与点阵100中的密码信息结合成验证用信息,用于二维码(物品)真伪的验证;联网模块405用于与服务器700和数据库600连接;显示模块406用于显示二维码30的解码信息和验证结果。
网络500用于解码终端400与数据库600和服务器700连接。
数据库600用于验证物品的真伪,具有验证模块601、计数模块602。
服务器700提供验证用APP(验证软件)下载。
以下对组合二维码防伪方法进行说明。图10为组合二维码防伪方 法的流程图。
组合二维码粘贴、印刷或打印在物品的表面或外包装上,用安装有识读终端400的手机拍摄组合二维码300。如图10所示,
步骤1,组合二维码读取模块401读取粘贴、印刷或打印在待验证物品或外包装上的组合二维码300。
步骤2,二维码解码模块402对组合二维码300中的二维码30解码,得到如下信息,此时,点阵100被覆盖层覆盖,无法读取和解码。
·234734631212
·下载“雅培奶粉”APP验证。
步骤3,显示模块406显示该信息。
步骤4,下载并安装“雅培奶粉”APP验证软件,在识读终端400中生成点阵解码模块403、验证数据生成模块404。
步骤5,移除至少部分覆盖层,使点阵100能够解码,并再次拍摄
组合二维码300。
步骤6,点阵解码模块403对二维码300中的对点阵100解码,得到密码信息963215。
步骤7,验证数据生成模块404将二维码中的数字234734631212与点阵中的963215结合起来,生成验证用信息(数字)234734631212963215。该验证用数字由网络500发送数据库600。
步骤8,数据库600中的验证模块601将验证用数字与存储在数据库中的字符串做对比,进行验证,同时、计数模块602对验证的次数进行计数。验证的结果和验证次数通过网络500再发送到识读终端400。
步骤9,识读终端400中的显示模块406显示验证的结果和验证次数。即,与数据库中的字符串一致时,显示验证通过,不一致时显示验证未通过,并提示验证(查询)次数。
变形例
变形例中,二维码30中编入的信息为以下的网页链接,省略了物流码:
·http://www.abbott.com.cn/our-products/eleva.html
点阵100中编入以下的密码信息:
·129632153456。
用识读终端400读取二维码300时并解码时,直接链接上网,并进入以上链接指定的网页。
在该网页中提示:下载”雅培奶粉”app验证。其余与实施方式相同。
变形例除没有物流信息外,效果与实施方式相同。以上对组合二维码的防伪系统及验证方法进行了说明。
由以上实施方式可知,在本发明中,由于在普通的二维码30(QR码)中引入了点阵100,点阵100的表面被至少部分覆盖,编入点阵100的密码信息采用保密算法进行加密处理,大大增加了系统造假难度。并且,二维码30中编入的信息只是引导下载或启动验证软件的信息,点阵100的解码以及验证用信息的形成由验证软件完成,提高了通过伪造二维码和网站的进行系统造假的难度。
由于形成验证用信息的原始信息中包含物流码、产品序号或产品批次等不断变化的信息,因此,不同的物品或批次的二维码30图形(码图)均不相同,即,由于不同的物品或批次的二维码的图形发生变化(图形变码),无法通过复制二维码来造假,进一步增加了造假的难度。
同时,由于二维码中编入物流码、营销信息和网址,从而实现了一码多用,大大节省了成本,做到了防伪、物流、营销一码化,解决了制造企业多年的难题。
以下对本发明的变形例进行说明。
变形例1
实施方式中,验证用数字由二维码中与物流码、产品序号、产品批次与点阵100中的密码信息构成,变形例中,直接使用点阵100中的密码信息进行验证。
实施方式中,验证在数据库进行,变形例中,下载APP验证软件时,同时将数据库中的字符串下载到识读终端,直接在识读终端本地验证,省略了与数据库的连接。
变形例2
实施方式中,直接将二维码30中的数字和点阵100中的密码连接在一起构成验证用数据,利用物流码、产品序号、产品批次等信息的变化,使二维码30的图形变码,变形例中,增加变码模块,由变码模块使编入二维码30中的信息产生变化。这样,即使编入二维码30的信息都是固定信息,也能使二维码30图形变码,提高造假难度。
在实施方式中,编入点阵100的信息是不变的,但点阵100也可采用图形变码,因为点阵100被至少部分覆盖,在覆盖层至少被部分去除前,点阵100不能被识读,起到了暗码防伪作用。
二维码30和点阵100的图形变码可单独使用也可组合使用。
实施方式中,验证用信息是直接由二维码30中的信息与点阵100中的密码信息组合而成,但也可以取其中的一部分组合成验证用信息。
以上实施方式及变形例中,生成二维码30以及点阵100的信息均存储在数据库中用于验证,如作为验证用信息编入二维码30的物流码、产品序号、产品批次等,编入点阵100的密码信息,以及组成验证用信息的算法等均存储在数据库中。
变形例
在图1至4中,点阵100的深色模块为圆点,与二维码30中的矩形模块的形状不同,在变形例中,点阵100中的模块的形状、大小、间距和位置与所述二维码30中的模块的形状、大小、间距和位置相同,因此,点阵100的图形不仅覆盖部分二维码30,由于点阵100的模块在视觉效果上与二维码30的模块保持一致,起到了隐藏点阵100图形的效果。
作为二维码30也可在生成时,预先生成供点阵100嵌入的空白部分,由于空白部分没有模块存在,点阵100嵌入空白部分时不会因遮挡二维码30的模块,造成二维码30读取时的误码,与利用二维码的纠错能力纠错点阵100引起误码的方案相比,可以降低二维码30的纠错等级、提高解码运算速度。
以上只是本发明的较佳实施方式和变形例,本领域的技术人员可应 用现有的技术,在本发明技术思想的范围内进行改动或替换。

Claims (11)

  1. 组合二维码防伪系统,其特征在于包括,组合二维码(300)、识读装置(400)、验证软件(403、404)、网络(500)、数据库(600)、服务器(700),
    所述组合二维码包括二维码(30)和点阵(100),所述二维码(30)中至少编入与验证软件相关的信息,所述点阵(100)中编入密码信息,所述点阵(100)的表面被覆盖层所覆盖,在覆盖层被至少部分移除之前,点阵(100)无法解码,
    所述识读装置(400)用于对所述组合二维码中的二维码(30)解码,并由与验证软件相关的信息引导,下载或启动验证软件(403、404),对验证的结果进行显示,
    所述验证软件(403、404)由所述网络(500)下载到所述识读装置(400),用于在将所述覆盖层至少部分移除后对所述点阵(100)解码,并将解码的密码信息或所述密码信息与所述二维码(30)中的信息结合成验证用信息,
    数据库(600)根据所述验证用信息判断所述组合二维码的真伪。
  2. 根据权利要求1所述的组合二维码防伪系统,其特征在于,所述数据库(600)由所述网络(500)下载到所述识读装置(400),对所述验证用信息进行本地验证。
  3. 根据权利要求2所述的组合二维码防伪系统,其特征在于,编入所述二维码(30)的信息包括:引导下载验证软件的信息和用于组建验证用信息的信息。
  4. 根据权利要求3所述的组合二维码防伪系统,其特征在于,用于组建验证用信息的信息为变动的信息,包括物品的物流码、产品序号、产品批次中的任何一个或组合。
  5. 根据权利要求4所述的组合二维码防伪系统,其特征在于,数据库(600)对验证的次数进行计数,计数值作为验证结果由所述识读装置(400)显示。
  6. 根据权利要求1至5中任一项所述的组合二维码防伪系统,其特征在于,验证软件(403、404)采用改变信息组成的方式生成所述验证用信息。
  7. 根据权利要求1至5中任一项所述的组合二维码防伪系统,其特征在于,编入所述点阵(100)的密码信息为变动的信息。
  8. 识读装置,其特征在于包括,组合二维码读取模块(401)、二维码解码模块(402)、联网模块(405)、显示模块(406),通过安装验证软件还具有点阵解码模块(403)、验证数据生成模块(404),
    所述组合二维码读取模块(401)用于读取组合二维码(300),
    所述二维码解码模块(402)用于对组合二维码(300)中的二维码(30)解码,并由与验证软件相关的信息引导,下载或启动验证软件(403、404);
    所述点阵解码模块(403)用于在至少部分移除覆盖在点阵(100)表面的覆盖层(200)后,对二维码300中的点阵(100)解码;
    所述验证数据生成模块(404)将二维码(30)中与验证相关的信息与点阵(100)中的密码信息结合成验证用信息;
    所述联网模块(405)用于与服务器和数据库连接;
    所述显示模块(406)用于显示二维码(30)的解码信息和验证结果。
  9. 组合二维码防伪方法、其特征在于,包括以下步骤,步骤1,
    步骤1,读取粘贴、印刷或打印在待验证物品或外包装上的组合二维码(300),
    步骤2,对组合二维码(300)中的二维码(30)解码,此时,点阵(100)被覆盖层覆盖,无法读取,
    步骤3,显示二维码(30)的解码信息,
    步骤4,由解码信息中的信息引导,下载或启动验证软件,
    步骤5,移除至少部分覆盖层,使点阵(100)能够解码,并获取点阵(100)的图像,
    步骤6,对点阵(100)解码,
    步骤7,将二维码中的信息与点阵中的信息结合起来,生成验证用信息,该验证用信息发送到数据库(600),
    步骤8,数据库(600)将验证用信息与存储在数据库中的字符串做对比,进行验证,同时、对验证的次数进行计数,
    步骤9,显示验证的结果的次数。
  10. 组合二维码,用于权利要求1至9中任一项权利要求,其特征在于包括,二维码(30)和点阵(100),点阵(100)与二维码(30)在图形上保持关联,点阵(100)的设置区域(40)位于所述二维码(30)的图形内或图形外,位于图形内时,设置区域(40)的大小参照二维码(30)的纠错等级设定,以使点阵(100)引起的误码率与二维码本身的误码率之和小于二维码的纠错率,保证二维码(30)的解码不受影响,所述二维码(30)中至少编入与验证软件相关的信息,所述点阵(100)中编入密码信息,所述点阵(100)具有与所述二维码(30)相同或内不同的纠错率。
  11. 根据权利要求10所述的组合二维码,其特征在于,所述点阵(100)中的模块的形状、大小、间距和位置与所述二维码(30)中的模块的形状、大小、间距和位置相同,所述点阵(100)嵌入所述二维码(30)中时,在视觉效果上与周边的所述二维码(30)的模块保持一致。
PCT/CN2017/115344 2016-12-09 2017-12-08 组合二维码防伪系统和方法、组合二维码、识读装置 WO2018103756A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611128193.4 2016-12-09
CN201611128193.4A CN108229969A (zh) 2016-12-09 2016-12-09 组合二维码防伪系统和方法、组合二维码、识读装置

Publications (1)

Publication Number Publication Date
WO2018103756A1 true WO2018103756A1 (zh) 2018-06-14

Family

ID=62490790

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/115344 WO2018103756A1 (zh) 2016-12-09 2017-12-08 组合二维码防伪系统和方法、组合二维码、识读装置

Country Status (2)

Country Link
CN (1) CN108229969A (zh)
WO (1) WO2018103756A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826673A (zh) * 2018-08-07 2020-02-21 深圳市中选科技有限公司 一种彩块码及其生成方法、系统
CN111311281A (zh) * 2020-02-17 2020-06-19 跃明科技成都有限公司 一种基于网址信息的防伪方法与防伪系统
CN111612476A (zh) * 2020-05-09 2020-09-01 艾斯芸防伪科技(福建)有限公司 二次校验防伪方法、装置、设备及存储介质
US11379853B2 (en) * 2019-01-16 2022-07-05 Locatorx, Inc. Certified quick response codes associated with top-level domains verified by trusted product certificate authority
CN115892576A (zh) * 2022-01-22 2023-04-04 红云红河烟草(集团)有限责任公司 一种基于点阵码技术的高速卷烟包装机的条盒关联系统
CN117745299A (zh) * 2023-10-31 2024-03-22 北京国立信科技术有限公司 一种基于二维码防伪的方法和系统

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222800A (zh) * 2019-04-30 2019-09-10 浙江大学 一种基于点阵的二维码防伪标识图像及其识别方法
CN112418372A (zh) * 2020-09-29 2021-02-26 四川谦泰仁投资管理有限公司 一种带标定功能的复合二维码系统
CN116151297B (zh) * 2023-04-19 2023-06-30 安徽瑞邦数科科技服务有限公司 一种基于时间变换机制的动态二维码系统及装置
CN116311274A (zh) * 2023-05-15 2023-06-23 山东履信思源防伪技术有限公司 一种防伪信息的识别方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101615258A (zh) * 2008-06-27 2009-12-30 银河联动信息技术(北京)有限公司 部分覆盖的二维码防伪标签及其形成方法
CN103794135A (zh) * 2014-02-17 2014-05-14 立德高科(北京)数码科技有限责任公司 由点阵与二维码形成的标识及对其进行生成与识别的方法
CN104778436A (zh) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 对组合式防伪标识进行识读的方法及装置
CN104794987A (zh) * 2014-01-21 2015-07-22 沈维 二维码防伪标签
CN105868815A (zh) * 2016-03-25 2016-08-17 立德高科(昆山)数码科技有限责任公司 基于同一个识别设备的叠加式组合标识、生成方法与系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490992B (zh) * 2014-09-19 2019-07-19 腾讯科技(深圳)有限公司 一种二维码的验证方法、装置和系统
CN204480273U (zh) * 2014-11-28 2015-07-15 天津联云网络技术有限公司 粘贴有二维码标签的产品包装体
CN104778489A (zh) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 一种组合式防伪标识、及其生成方法与生成装置
CN106097882A (zh) * 2016-03-25 2016-11-09 立德高科(昆山)数码科技有限责任公司 带有干扰层的组合标识、及其生成方法与生成系统
CN105913103B (zh) * 2016-04-08 2018-09-11 浙江大学 一种点阵防伪码图形及其识别方法
CN206348843U (zh) * 2016-12-09 2017-07-21 北京大码技术有限公司 组合二维码防伪系统、识读装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101615258A (zh) * 2008-06-27 2009-12-30 银河联动信息技术(北京)有限公司 部分覆盖的二维码防伪标签及其形成方法
CN104794987A (zh) * 2014-01-21 2015-07-22 沈维 二维码防伪标签
CN103794135A (zh) * 2014-02-17 2014-05-14 立德高科(北京)数码科技有限责任公司 由点阵与二维码形成的标识及对其进行生成与识别的方法
CN104778436A (zh) * 2015-03-24 2015-07-15 立德高科(北京)数码科技有限责任公司 对组合式防伪标识进行识读的方法及装置
CN105868815A (zh) * 2016-03-25 2016-08-17 立德高科(昆山)数码科技有限责任公司 基于同一个识别设备的叠加式组合标识、生成方法与系统

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826673A (zh) * 2018-08-07 2020-02-21 深圳市中选科技有限公司 一种彩块码及其生成方法、系统
US11379853B2 (en) * 2019-01-16 2022-07-05 Locatorx, Inc. Certified quick response codes associated with top-level domains verified by trusted product certificate authority
CN111311281A (zh) * 2020-02-17 2020-06-19 跃明科技成都有限公司 一种基于网址信息的防伪方法与防伪系统
CN111612476A (zh) * 2020-05-09 2020-09-01 艾斯芸防伪科技(福建)有限公司 二次校验防伪方法、装置、设备及存储介质
CN111612476B (zh) * 2020-05-09 2023-04-07 艾斯芸防伪科技(福建)有限公司 二次校验防伪方法、装置、设备及存储介质
CN115892576A (zh) * 2022-01-22 2023-04-04 红云红河烟草(集团)有限责任公司 一种基于点阵码技术的高速卷烟包装机的条盒关联系统
CN115892576B (zh) * 2022-01-22 2024-03-08 红云红河烟草(集团)有限责任公司 一种基于点阵码技术的高速卷烟包装机的条盒关联系统
CN117745299A (zh) * 2023-10-31 2024-03-22 北京国立信科技术有限公司 一种基于二维码防伪的方法和系统

Also Published As

Publication number Publication date
CN108229969A (zh) 2018-06-29

Similar Documents

Publication Publication Date Title
WO2018103756A1 (zh) 组合二维码防伪系统和方法、组合二维码、识读装置
CN108229596B (zh) 组合二维码、电子证书载体、生成、识读装置及方法
US10970615B2 (en) Systems and methods for generating secure tags
JP6961705B2 (ja) 複合型二次元バーコード生成、読取装置および方法
US9646296B2 (en) Mobile-to-mobile transactions
US9253131B2 (en) System and method for authentication of communications
US9613327B2 (en) Adapting an incremental information object
CN108351956B (zh) 用于印刷取证编码的2d条形码的方法和系统
US9934457B2 (en) Method of securing a two-dimensional barcode
US9563830B2 (en) Incremental information object with an embedded information region
CN206348843U (zh) 组合二维码防伪系统、识读装置
CN101291226B (zh) 一种利用图片信息提高信息安全设备验证安全性的方法
CN113313225B (zh) 基于稀疏点阵码的防伪方法
MXPA06003535A (es) Metodo y sistema para controlar la produccion de imagenes codificadas.
US9477853B2 (en) Generating an incremental information object
US9087252B2 (en) Grayscale incremental information object
US8915450B2 (en) Dual deterent incremental information object
US8857711B2 (en) Tracking customer loyalty information using an incremental information object
CN102819801A (zh) 一种针对防伪设备的验伪系统和方法
WO2020090088A1 (ja) エンコード方法、デコード方法、エンコーダ及びデコーダ
WO2014064451A1 (en) System and method for the authentication of communications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17878482

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17878482

Country of ref document: EP

Kind code of ref document: A1