WO2021101298A1 - Forgery and falsification verification apparatus using heterogeneous pattern, and driving method for same - Google Patents
Forgery and falsification verification apparatus using heterogeneous pattern, and driving method for same Download PDFInfo
- Publication number
- WO2021101298A1 WO2021101298A1 PCT/KR2020/016430 KR2020016430W WO2021101298A1 WO 2021101298 A1 WO2021101298 A1 WO 2021101298A1 KR 2020016430 W KR2020016430 W KR 2020016430W WO 2021101298 A1 WO2021101298 A1 WO 2021101298A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- pattern
- forgery
- verification
- scan data
- present
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/10—Image acquisition
- G06V10/16—Image acquisition using multiple overlapping images; Image stitching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/98—Detection or correction of errors, e.g. by rescanning the pattern or by human intervention; Evaluation of the quality of the acquired patterns
- G06V10/993—Evaluation of the quality of the acquired pattern
Definitions
- the present invention relates to a forgery verification device using a heterogeneous pattern and a method of driving the device, and more particularly, for example, by mixing an opaque pattern and a transparent pattern to form a secret, thereby forgery and alteration using a heterogeneous pattern enabling double verification. It relates to a verification device and a driving method of the device.
- the larger the size difference the better the effect of distinguishing the missing part and the outstanding part during copying.
- the size difference is large, it is possible to visually check the original print before copying. Applicability is inferior because it is easy to understand.
- An object of the present invention is to provide a forgery and alteration verification apparatus using a heterogeneous pattern and a driving method of the apparatus that enables double verification by forming a secret by mixing an opaque pattern and a transparent pattern, for example.
- an interface unit for receiving scan data of a discrimination object including a first pattern that can be identified with the naked eye and a second pattern that cannot be identified with the naked eye, and the received scan
- a control unit for determining a duplication or forgery based on whether the first pattern and the second pattern are recognized based on the analysis result of the data.
- the interface unit may receive scan data having different characteristics according to a scanning method of the object to be determined.
- the control unit may determine whether the object to be determined is authentic or not by recognizing the second pattern in the first user device of the first scan method.
- the control unit may recognize the first pattern in the second user device of the second scan method to determine the duplication or forgery of the object to be determined.
- the interface unit may receive scan data of the object to be determined including the first pattern and the second pattern formed on different layers.
- the forgery and alteration verification method using heterogeneous patterns includes the steps of receiving scan data of a discrimination target including a first pattern that can be identified with the naked eye and a second pattern that cannot be identified with the naked eye, and the received And determining a duplication or forgery according to whether the first pattern and the second pattern are recognized based on the analysis result of the scan data.
- scan data having different characteristics may be received according to a scan method of the object to be determined.
- the first user device of the first scan method may recognize the second pattern and determine whether the object to be determined is authentic.
- the second user device of the second scan method may recognize the first pattern to determine the duplication or forgery of the object to be determined.
- scan data of the object to be determined including the first pattern and the second pattern formed on different layers may be received.
- FIG. 1 is a diagram showing a forgery and alteration verification service system according to an embodiment of the present invention
- FIG. 2 is a view for explaining a discrimination object according to an embodiment of the present invention.
- FIG. 3 is a block diagram illustrating a detailed structure of a forgery verification apparatus according to an embodiment of the present invention.
- FIG. 4 is a flowchart illustrating a driving process of a forgery verification device according to an embodiment of the present invention.
- FIG. 1 is a diagram showing a forgery verification service system according to an embodiment of the present invention
- FIG. 2 is a view for explaining a determination object according to an embodiment of the present invention.
- the forgery and alteration verification service system 90 includes a copy machine 100, a user terminal device 110, a communication network 120, and a part of the forgery and alteration verification service device 130, or All are included, and a printer (or printing device) for printing a pattern according to an embodiment of the present invention may further be included.
- a component such as a printer or a copy machine 100 operates in a stand alone form, or some or all of the components such as the forgery verification service device 130 are It refers to something that can be integrated and configured in a network device (eg, a wireless switching device, etc.) constituting the communication network 120, and will be described as including all in order to help a sufficient understanding of the invention.
- a network device eg, a wireless switching device, etc.
- the determination object 97 subjected to forgery and alteration determination according to an embodiment of the present invention may be formed by a separate printer (or printer), or the like, and may be formed in various forms. Although it may be formed in a document or the like, it may be formed in a separate mark, that is, in the form of a non-mark and attached to the product. Therefore, there will be no particular limitation on the shape of the discrimination object 97 according to the embodiment of the present invention. As shown in FIGS. 1 and 2, the discrimination target 97 has a configuration for preventing forgery and alteration by using a combination of transparent and opaque in a plurality of layers.
- the discrimination target 97 implements a two-dimensional pattern code with colored ink and transparent ink, and for example, by double printing each pattern 97a, 97b, there is no color code and color difference that can be identified with the naked eye.
- the transparent code After applying the transparent code, only the transparent printed code is recognized as the original, and when duplication or forgery in the copier 100, only the remaining general code is recognized, so that authenticity and double verification are possible.
- the "general code” means an opaque pattern, that is, a pattern formed by colored ink.
- the object to be determined 97 may form a colored first pattern 97a that is visible to the naked eye and a transparent second pattern 97b that cannot be identified by the naked eye on the base layer.
- the first pattern 97a and the second pattern 97b may be formed on the same layer, but may be formed on different layers, and thus the embodiment of the present invention will not be particularly limited to any one shape.
- the first pattern 97a and the second pattern 97b are codes and have information.
- the printed pattern of a barcode or QR code contains information, it is finely formed on the base layer so that it is impossible to discriminate with the naked eye.
- the transparent pattern that is, the second pattern 97b cannot be determined with the naked eye, so when the object 97 is viewed with the naked eye, only the actual first pattern 97a may be exposed to the outside.
- the transparent pattern may be referred to as G (Gost)-DoT (Data of Things), and the colored pattern may be referred to as D-DoT. Therefore, it can be named G/D-DoT by mixing them.
- the reason for forming the first pattern 97a and the second pattern 97b together on the discrimination target 97 may have various purposes, but in the case of a general user using a smart phone, the discrimination target through their smartphone
- the product or product with (97) attached or formed makes it easy to determine whether it is genuine through an application installed on a smartphone (hereinafter, referred to as an app), and also duplicates the identification object 97 and attaches it to the product or product. If you want to, or if you want to verify this, it is to ensure that double verification is performed together with the method using the above smartphone.
- double verification may be possible by copying the corresponding identification object 97 to the copier 100.
- the information on the opaque first pattern 97a exposed by the copier 100 may be checked.
- the object to be determined 97 may be used by forming the first pattern 97a and the second pattern 97b in various forms according to the type of genuine product or the request of the manufacturer. For example, this is because the first pattern 97a and the second pattern 97b may include information such as a manufacturer. Of course, it is also possible to use only the first pattern 97a or only the second pattern 97b. Although any number is possible, it will be described as including heterogeneous patterns in consideration of double verification in the embodiment of the present invention.
- the discrimination target 97 may also be used. For example, when a corresponding genuine product is shipped, it is possible to use it by scanning the attached determination object 97 or by programmatically generating reference data on the administrator's computer.
- the discrimination object 97 may be used by forming the first pattern 97a and the second pattern 97b in the production process. For example, it can be formed in a chamber that forms the first pattern 97a and the second pattern 97b, but it can be formed by a printing method using a roller, and the determination
- the object 97 can be attached to the product through verification during quality inspection, and is generated as reference data and stored in the DB 130a of the forgery and alteration verification service device 130, or the copy machine 100 or the user through a program or an app. It may be provided as a terminal device (110).
- the first pattern 97a and the second pattern 97b of the object to be determined 97 are, in particular, the opaque first pattern 97a using colored ink, which is scanned by the user terminal device 110 such as a smartphone. It is preferable that the appearance is not exposed, and is exposed to the outside in the copier 100. However, the first pattern 97a may be revealed on the scanned image by the user terminal device 110, and the user terminal device 110 may form a shadow.
- the scanning method for forming a scanned image is different from that of the user terminal device 110, and for example, the copier 100 performs a line-by-line scan operation, and in the case of the user terminal device 110 Since a scanned image is acquired by shining light on the front side, in the embodiment of the present invention, due to the difference in the scanning method, double verification is performed using this, but in addition, various methods for verification using heterogeneous patterns may be more possible. Therefore, in the embodiment of the present invention will not be specifically limited to the above content.
- the copier 100 serves as a forgery verification device according to an embodiment of the present invention together with a printer and a user terminal device 110. It can be operated in parallel as well as independent operation.
- the copier 100 includes a general copier as well as a high-resolution color copier capable of forgery or alteration of documents among products on the market. This is the reason why it is necessary to prevent forgery or alteration of genuine products with high-performance color copiers as the technology develops more and more.
- the copier 100 according to the embodiment of the present invention may include a technology for verifying forgery and alteration, but may be merely a device that verifies or confirms when the object to be determined 97 is forged or altered.
- the internal copying conditions of the copying machine 100 are such that the first pattern 97a of the object to be determined 97 is exposed to the outside in terms of brightness, data conversion, etc. when scanning a lamp.
- the first pattern 97a may be changed in various forms without departing from the technical matters of the present invention.
- the authenticity may be determined through the copier 100 first, and then the authenticity may be determined through the user terminal device 110 as well.
- it may be determined whether the first pattern 97a is exposed to the outside, and whether or not the recognized information is matched accordingly, even if it is exposed. Through this, you will be able to determine whether it is authentic or not. For example, if a manufacturer's name, manufacturing date, and product model name are contained through the first pattern 97a, after checking these, it may be possible to determine whether the authenticity or not.
- the user terminal device 110 may also serve as a forgery verification device for double verification according to an embodiment of the present invention together with the copier 100.
- the user terminal device 110 may include a smartphone or a wearable device such as a domestic S company's Galaxy* Gear.
- the user terminal device 110 may include a high-resolution camera capable of photographing. The principle of reading a document through the scanner of the copier 100 is not much different from that taken through the user terminal device 110 through a high-resolution camera. Accordingly, in the case of the user terminal device 110 as well as the copier 100, it is possible to verify that there is forgery or alteration as much as possible.
- the user terminal device 110 uses the characteristic of light shining on the front of the object to be determined 97, whereas the copier 100 is driven for each scan line, so the scanning method is somewhat different. For this reason, it can be seen that different verification methods are performed for the same determination object 97. For example, if it is set to analyze the presence or absence of a shadow of an opaque pattern through the user terminal device 110 according to the intention of the system designer, a triple verification may be performed instead of a double verification.
- the flash of the user terminal device 110 is performed by the second pattern 97b formed of transparent ink. Photographing is taken by reflecting the light caused by. This reflection characteristic can be used to determine forgery or alteration or duplication of the object to be determined 97.
- the colored first pattern 97a which is an opaque pattern, may have a shade around it. Accordingly, the user terminal device 110 may determine that the object to be determined 97 is the original or the original when the reflective area is detected through the second pattern 97b, and when the reflective area is not detected, duplication or forgery is performed. Know that there is. Of course, the user terminal device 110 may inform the user of this through an app. Since shading information of the first pattern 97a may be further used, there will be no particular limitation to the above in the embodiment of the present invention.
- the user terminal device 110 can perform the above operation through a dedicated app downloaded from an external (eg, app store) for forgery verification, but use the app to verify forgery or alteration. It may be requested to the forgery and alteration verification service device 130. Accordingly, the scan data photographed through the user terminal device 110 may be transmitted to the forgery and alteration verification service device 130 to receive a verification result thereof and present it to the user.
- the user terminal device 110 may operate in various forms according to the intention of the system designer, although the same applies to the copier 100.
- the communication network 120 includes all wired and wireless communication networks.
- a wired/wireless Internet network may be used or interlocked.
- the wired network includes an Internet network such as a cable network or a public telephone network (PSTN)
- the wireless communication network includes CDMA, WCDMA, GSM, Evolved Packet Core (EPC), Long Term Evolution (LTE), and Wibro networks. It is meant to include.
- the communication network 120 according to the embodiment of the present invention is not limited thereto, and may be used as an access network for a next-generation mobile communication system to be implemented in the future, for example, a cloud computing network or a 5G network under a cloud computing environment.
- the AP in the communication network 120 can access the switching center of the telephone office, but in the case of a wireless communication network, it accesses SGSN or GGSN (Gateway GPRS Support Node) operated by a communication company to process data.
- SGSN Serving GPRS Support Node
- GGSN Gateway GPRS Support Node
- data can be processed by accessing various repeaters such as BTS (Base Station Transmission), NodeB, and e-NodeB.
- the communication network 120 may include an AP.
- APs include small base stations such as femto or pico base stations that are frequently installed in buildings.
- the femto or pico base station is classified according to the maximum number of units that can be connected to the copier 100 or the user terminal device 110 according to the classification of the small base station.
- the AP may include a short-range communication module for performing short-range communication such as the copy machine 100 or the user terminal device 110 with Zig-bee and Wi-Fi.
- the AP can use TCP/IP or RTSP for wireless communication.
- short-range communication includes various standards such as RF and ultra wideband communication (UWB) such as Bluetooth, ZigBee, infrared, UHF and VHF in addition to Wi-Fi as mentioned above.
- UWB ultra wideband communication
- the AP extracts the location of the data packet, designates the best communication path for the extracted location, and transfers the data packet to the next device, for example, the forgery verification service device 130 along the designated communication path.
- APs can share multiple lines in a general network environment, and include routers, repeaters, and repeaters.
- the forgery verification service device 130 may include, for example, a server of an operator operating a DoT service. Through this, an operation such as playing music or the like can be performed.
- the forgery verification service device 130 may be set and operated in various ways according to the intention of the system designer. For example, the forgery and alteration verification operation may be performed by itself in the copier 100 or the user terminal device 110 that substantially operates as a forgery and alteration verification device. This has already been explained above. However, the forgery and alteration verification service device 130 downloads an app, generates data, or manages the generated data in order to provide a service according to an embodiment of the present invention, and there is a request for verification from the user terminal device 110. When it is set to perform the verification, the verification operation may be performed. It may play a role of generating and providing data related to the determination object 97 of FIG. 1. It is to provide a service program for a kind of DoT service.
- the forgery and alteration verification service device 130 may monitor the forgery and alteration operation of the copier 100 or the user terminal device 110. In other words, it performs integrated management. For example, it is possible to quickly cope with the situation even in the event of a forgery or forgery event by determining where the copier 100 is located. Furthermore, the forgery and alteration verification service apparatus 130 may perform various operations such as generating, storing, and updating data managed through the determination object 97 of FIG. 1 by including the DB 130a.
- advertisement revenue according to service provision may be additionally generated, and above all, data management may be easier. For example, it may be easier to integrate and manage for smooth service for products manufactured for each manufacturer or for service targets such as music to be serviced.
- the forgery verification service device 130 may further apply and manage such a technology during integrated management such as applying a block chain technology for this purpose.
- FIG. 3 is a block diagram illustrating a detailed structure of a forgery verification apparatus according to an embodiment of the present invention.
- the forgery and alteration verification apparatuses 100 and 110 include at least one of the copier 100, the user terminal device 110, and the forgery and alteration verification service device 130 of FIG.
- a printer that is, a printing device may be included in the category of the forgery verification service device, but assuming the forgery verification service device 130, the communication interface unit (or interface unit, scanning unit) 300, the control unit ( 310), and some or all of the forgery and alteration verification unit 320 and the storage unit 330.
- the forgery and alteration verification device can be described as an example of the forgery and alteration verification service device 130, except for a printer, when considering the possibility of use by a third party comprehensively, as various devices can be used. will be good.
- a printer there is room to use the technology according to the embodiment of the present invention, but in the embodiment of the present invention, only the viewpoint of verification using data will be described.
- the communication interface unit 300 may perform communication with, for example, the copying machine 100 of FIG. 1 or the user terminal device 110. Scan data for a scanned image (or a photographed image, a photographed image) of the identification target 97 can be received from the copier 100 or the user terminal device 110, or more precisely, the user terminal device 110 through communication. . In addition, the communication interface unit 300 may transmit the verified verification result to the user terminal device 110 in response to a forgery verification request from the user terminal device 110.
- the communication interface unit 300 can download a dedicated app so that the user terminal device 110 can perform the operation according to the embodiment of the present invention, and in this respect, the forgery verification service device ( 130) can be a server such as an app store.
- the control unit 310 is in charge of overall control operations of the communication interface unit 300 of FIG. 3, the forgery verification unit 320, and the storage unit 330 constituting the forgery and alteration verification service apparatus 130 of FIG. 1. For example, when the scan data for the sales target 97 of FIG. 1 is provided through the communication interface unit 300, the control unit 310 temporarily stores the data in the storage unit 330 and then calls it to a forgery verification unit. It can be provided to (320). In addition, the controller 310 may control the communication interface unit 300 to provide the verification result to the user terminal device 110 when the verification result is provided to the forgery verification unit 320 according to the verification request.
- the forgery and forgery verification unit 320 analyzes the scan data provided by the user terminal device 110 to verify whether it is duplicated or forged. For example, by analyzing a pixel of the scan data to determine a 256 gray scale and analyzing whether a reflective area by the second pattern 97b of the object to be identified 97 is confirmed, when the reflective area is confirmed, Related verification results can be output.
- the reflective area may be identified, or the identified reflective area may be determined to be genuine or genuine through a specific image.
- the forgery and forgery verification unit 320 may verify in various forms in order to determine whether to duplicate or forgery.
- the forgery verification unit 320 may generate and store reference data for verification of forgery and alteration, or may use the reference data stored in the storage unit 330.
- original data provided from the manager's manager device (eg, computer, smartphone, etc.) is stored as reference data.
- the original data refers to data obtained through the formation of the genuine product or the identification object 97 of the original. It may be programmatically generated and provided through the administrator's computer, or data generated through an image captured through a smartphone on which an administrator-specific app is installed may be provided.
- the storage unit 330 stores various types of information and data processed under the control of the controller 310. If the information refers to a simple control command, the data may refer to scanned pixel data or the like, but in the embodiment of the present invention, the concept of such terms will not be particularly limited. That is, the above terms can be used interchangeably.
- control unit 310 of FIG. 3 is another embodiment of the present invention, and may include a CPU and a memory.
- the CPU and memory may be formed in one chip.
- the CPU includes a control circuit, an operation unit (ALU), an instruction interpretation unit, a registry, and the like, and the memory may include RAM.
- the control circuit can perform the control operation, the operation unit operates the operation of binary bit information, the instruction analysis unit interprets the high-level language into the machine language and the machine language into the high-level language, and the registry is responsible for software data storage. I can.
- the program or algorithm stored in the forgery verification unit 320 is stored in the memory and executed, thereby increasing the operation processing speed quickly. I will be able to.
- FIG. 4 is a flowchart illustrating a driving process of a forgery verification device according to an embodiment of the present invention.
- the forgery and alteration verification service device 130 includes a first pattern 97a capable of visual identification (or opaque). ) And scan data of the object to be determined 97 including a second pattern 97b that cannot be visually identified (or transparent) is received (S400).
- the user terminal device 110 may photograph the identification target 97 through a camera to acquire the scan data of the scanned image, and then transmit the scan data to the forgery verification service device 130.
- the forgery and forgery verification service apparatus 130 determines a duplication or forgery according to whether the first pattern 97a and the second pattern 97b are recognized based on the analysis result of the received scan data (S410).
- S410 the analysis result of the received scan data
- the length and width of the formed pattern means information
- a plurality of first patterns 97a formed in a size or group of the first pattern 97a are Codes, that is, patterns 97a and 97b, such as a formed shape or arrangement, may be variously formed and utilized.
- the second pattern 97b according to the embodiment of the present invention is confirmed to be authentic in a user terminal device 110 such as a smartphone, and the first pattern 97a is copied from the copy machine 100 to the original. If judged, the product becomes authentic through double verification.
- the forgery and alteration verification service apparatus 130 can perform various operations, and other details have been sufficiently described above, and thus, the contents will be substituted.
- the forgery and alteration verification service device 130 has been described as an example in consideration of the possibility of use by a third party, for convenience of explanation, but as mentioned above, the embodiment of the present invention In the following, it can be applied to the devices in various forms.
- the present invention is not necessarily limited to this embodiment. That is, within the scope of the object of the present invention, all the constituent elements may be selectively combined and operated in one or more.
- all of the components may be implemented as one independent hardware, a program module that performs some or all functions combined in one or more hardware by selectively combining some or all of the components. It may be implemented as a computer program having Codes and code segments constituting the computer program may be easily inferred by those skilled in the art of the present invention.
- Such a computer program is stored in a non-transitory computer readable media that can be read by a computer and is read and executed by a computer, thereby implementing an embodiment of the present invention.
- the non-transitory readable recording medium is not a medium that stores data for a short moment, such as a register, cache, memory, etc., but a medium that stores data semi-permanently and can be read by a device.
- the above-described programs may be provided by being stored in a non-transitory readable recording medium such as a CD, DVD, hard disk, Blu-ray disk, USB, memory card, ROM, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Editing Of Facsimile Originals (AREA)
- Facsimiles In General (AREA)
Abstract
Description
Claims (4)
- 육안 식별이 가능한 제1 패턴과 육안 식별이 불가능한 제2 패턴을 포함하는 판별대상의 스캔 데이터를 수신하는 단계; 및Receiving scan data of a discrimination target including a first pattern capable of visual identification and a second pattern incapable of visual identification; And상기 수신한 스캔 데이터의 분석 결과를 근거로 상기 제1 패턴 및 상기 제2 패턴의 인식 여부에 따라 복제 또는 위변조를 판단하는 단계;를 포함하되,Determining a duplication or forgery according to whether the first pattern and the second pattern are recognized based on the analysis result of the received scan data; including,상기 스캔 데이터를 수신하는 단계는,Receiving the scan data,상기 판별대상의 스캔 방식에 따라 서로 다른 특성의 스캔 데이터를 수신하고,Receive scan data of different characteristics according to the scanning method of the object to be determined,상기 복제 또는 위변조를 판단하는 단계는,The step of determining the duplication or forgery,제1 스캔 방식의 제1 사용자장치에서 상기 제2 패턴을 인식하여 상기 판별대상의 진위 여부를 판단하고, 제2 스캔 방식의 제2 사용자장치에서 상기 제1 패턴을 인식하여 상기 판별대상의 복제 또는 위변조를 판단하여 이중 검증을 수행하며,The first user device of the first scan method recognizes the second pattern to determine the authenticity of the object to be determined, and the second user device of the second scan method recognizes the first pattern to duplicate or Double verification is performed by judging forgery and alteration,상기 수신한 스캔 데이터의 화소(pixel)를 분석하여 상기 제1 패턴에 의한 음영이 확인되지는 및 상기 제2 패턴에 의한 반사영역이 확인되는지를 판단해 상기 복제 또는 위변조를 이중으로 판단하는 이종 패턴을 이용한 위변조 검증방법.A heterogeneous pattern that analyzes a pixel of the received scan data to determine whether a shadow by the first pattern and a reflective area by the second pattern are identified, thereby determining the duplication or forgery as a double Forgery verification method using
- 제1항에 있어서,The method of claim 1,상기 스캔 데이터를 수신하는 단계는,Receiving the scan data,서로 다른 층에 형성되는 상기 제1 패턴 및 상기 제2 패턴을 포함하는 상기 판별대상의 스캔 데이터를 수신하는 이종 패턴을 이용한 위변조 검증방법.A forgery verification method using heterogeneous patterns for receiving scan data of the object to be determined including the first pattern and the second pattern formed on different layers.
- 육안 식별이 가능한 제1 패턴과 육안 식별이 불가능한 제2 패턴을 포함하는 판별대상의 스캔 데이터를 수신하는 인터페이스부; 및An interface unit for receiving scan data of a discrimination target including a first pattern capable of visual identification and a second pattern incapable of visual identification; And상기 수신한 스캔 데이터의 분석 결과를 근거로 상기 제1 패턴 및 상기 제2 패턴의 인식 여부에 따라 복제 또는 위변조를 판단하는 제어부;를 포함하되,Including; a control unit for determining the duplication or forgery based on the recognition of the first pattern and the second pattern based on the analysis result of the received scan data;상기 인터페이스부는,The interface unit,상기 판별대상의 스캔 방식에 따라 서로 다른 특성의 스캔 데이터를 수신하고,Receive scan data of different characteristics according to the scanning method of the object to be determined,상기 제어부는,The control unit,제1 스캔 방식의 제1 사용자장치에서 상기 제2 패턴을 인식하여 상기 판별대상의 진위 여부를 판단하고, 제2 스캔 방식의 제2 사용자장치에서 상기 제1 패턴을 인식하여 상기 판별대상의 복제 또는 위변조를 판단하여 이중 검증을 수행하며,The first user device of the first scan method recognizes the second pattern to determine the authenticity of the object to be determined, and the second user device of the second scan method recognizes the first pattern to duplicate or Double verification is performed by judging forgery and alteration,상기 제어부는,The control unit,상기 수신한 스캔 데이터의 화소를 분석하여 상기 제1 패턴에 의한 음영이 확인되지는 및 상기 제2 패턴에 의한 반사영역이 확인되는지를 판단해 상기 복제 또는 위변조를 이중으로 판단하는 이종 패턴을 이용한 위변조 검증장치.Forgery using a heterogeneous pattern that analyzes the pixels of the received scan data to determine whether the shadow by the first pattern and the reflective area by the second pattern are confirmed, and to determine the duplication or forgery as double Verification device.
- 제3항에 있어서,The method of claim 3,상기 인터페이스부는, 서로 다른 층에 형성되는 상기 제1 패턴 및 상기 제2 패턴을 포함하는 상기 판별대상의 스캔 데이터를 수신하는 이종 패턴을 이용한 위변조 검증장치.The interface unit is a forgery verification device using heterogeneous patterns for receiving scan data of the object to be determined including the first pattern and the second pattern formed on different layers.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2019-0150970 | 2019-11-22 | ||
KR1020190150970A KR102163122B1 (en) | 2019-11-22 | 2019-11-22 | Apparatus for Verifying Counterfeit and falsification by Using Different Patterns and Driving Method Thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021101298A1 true WO2021101298A1 (en) | 2021-05-27 |
Family
ID=72884762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2020/016430 WO2021101298A1 (en) | 2019-11-22 | 2020-11-20 | Forgery and falsification verification apparatus using heterogeneous pattern, and driving method for same |
Country Status (2)
Country | Link |
---|---|
KR (2) | KR102163122B1 (en) |
WO (1) | WO2021101298A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102163122B1 (en) * | 2019-11-22 | 2020-10-07 | 주식회사 더코더 | Apparatus for Verifying Counterfeit and falsification by Using Different Patterns and Driving Method Thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008132601A (en) * | 2006-11-27 | 2008-06-12 | National Printing Bureau | Antifalsifying printed material |
KR20130142811A (en) * | 2012-06-20 | 2013-12-30 | 서울대학교산학협력단 | Code mark and manufacturing method, cognition system, cognition method thereof |
JP2015101040A (en) * | 2013-11-27 | 2015-06-04 | 独立行政法人 国立印刷局 | Printed matter, and production method and production system of printed matter |
KR102007685B1 (en) * | 2019-04-10 | 2019-08-06 | 주식회사서영컴퍼니 | Hybrid counterfeit discrimination apparatus, and system thereof |
JP2019188756A (en) * | 2018-04-27 | 2019-10-31 | 凸版印刷株式会社 | Forgery-preventing printed matter |
KR102163122B1 (en) * | 2019-11-22 | 2020-10-07 | 주식회사 더코더 | Apparatus for Verifying Counterfeit and falsification by Using Different Patterns and Driving Method Thereof |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR940006793A (en) | 1992-09-29 | 1994-04-25 | 스기에 다께시 | Latent Expression Copy Counterfeit Paper |
KR960012223B1 (en) | 1994-08-31 | 1996-09-18 | 만도기계 주식회사 | Pressure regulation valve of power steering system |
KR20010070865A (en) | 2001-06-14 | 2001-07-27 | 최종욱 | Apparatus for preventing duplication and forgery/alternation of document and authenticating it |
KR100405828B1 (en) | 2002-02-01 | 2003-11-14 | 주식회사 마크애니 | Apparatus and method for producing a document which is capable of preventing a forgery or an alteration of itself, and apparatus and method for authenticating the document |
KR100587621B1 (en) | 2004-12-16 | 2006-06-08 | 한국조폐공사 | A security paper with optical variable complex latent image and method of preparing thereof |
KR20090053563A (en) | 2007-11-23 | 2009-05-27 | 한국조폐공사 | A printed matter for forgery prevention using color printer and manufacturing method thereof |
KR101770984B1 (en) | 2016-03-14 | 2017-09-06 | 한국조폐공사 | A printing matter for preventing counterfeit and manufacturing method thereof |
-
2019
- 2019-11-22 KR KR1020190150970A patent/KR102163122B1/en active IP Right Grant
-
2020
- 2020-09-14 KR KR1020200117518A patent/KR102668040B1/en active IP Right Grant
- 2020-11-20 WO PCT/KR2020/016430 patent/WO2021101298A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008132601A (en) * | 2006-11-27 | 2008-06-12 | National Printing Bureau | Antifalsifying printed material |
KR20130142811A (en) * | 2012-06-20 | 2013-12-30 | 서울대학교산학협력단 | Code mark and manufacturing method, cognition system, cognition method thereof |
JP2015101040A (en) * | 2013-11-27 | 2015-06-04 | 独立行政法人 国立印刷局 | Printed matter, and production method and production system of printed matter |
JP2019188756A (en) * | 2018-04-27 | 2019-10-31 | 凸版印刷株式会社 | Forgery-preventing printed matter |
KR102007685B1 (en) * | 2019-04-10 | 2019-08-06 | 주식회사서영컴퍼니 | Hybrid counterfeit discrimination apparatus, and system thereof |
KR102163122B1 (en) * | 2019-11-22 | 2020-10-07 | 주식회사 더코더 | Apparatus for Verifying Counterfeit and falsification by Using Different Patterns and Driving Method Thereof |
Also Published As
Publication number | Publication date |
---|---|
KR102668040B1 (en) | 2024-05-22 |
KR102163122B1 (en) | 2020-10-07 |
KR20210063216A (en) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11587339B2 (en) | Method for reading a code stored in a halftone image and comparison with a retrievable value | |
US9594994B2 (en) | Security element and method to inspect authenticity of a print | |
US10279583B2 (en) | System and method for storing digitally printable security features used in the creation of secure documents | |
WO2016163632A1 (en) | Method for generating data-inserted image and image generation device performing same | |
US20070041628A1 (en) | Detection of document security marks using run profiles | |
JPS60229572A (en) | Picture processor | |
WO2021101298A1 (en) | Forgery and falsification verification apparatus using heterogeneous pattern, and driving method for same | |
WO2021101290A1 (en) | Apparatus for determining authenticity using dot diffuse reflection characteristics, and driving method of same apparatus | |
WO2021101291A1 (en) | Authenticity verification device using shading, and driving method therefor | |
JP2023067165A (en) | Image processing apparatus and image processing method | |
WO2021101297A1 (en) | Forgery/tampering inspection device using latent image technology and method of operating same device | |
CN204377009U (en) | A kind of portable scanner for papery Text Watermarking decrypted authentication | |
KR20080052005A (en) | Imaging apparatus and system for management of the bogus note comprising the same | |
KR102500424B1 (en) | How to verify security devices containing signatures | |
US20220150378A1 (en) | Method of Printing Authentication Indicators with Amplitude Modulated Halftone Printing | |
KR102240840B1 (en) | the verifying authenticity system using the forgery prevention paper or the security printing structure | |
WO2020085655A1 (en) | Anti-counterfeiting printed material and manufacturing method therefor | |
JP2004158010A (en) | Pattern discrimination system | |
JPH04227365A (en) | Copying machine | |
JPH04227367A (en) | Picture processing unit | |
EP4364960A1 (en) | Multi-spectral watermark | |
JP7070152B2 (en) | Information processing system and print medium | |
KR20240110687A (en) | Apparatus of monitoring forge omen and method thereof | |
JPH04227372A (en) | Picture processing method | |
KR20170122096A (en) | Method of inserting authentication distinction code and method of distincting authentication of product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20889241 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20889241 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20889241 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08.12.2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20889241 Country of ref document: EP Kind code of ref document: A1 |