WO2023061374A1 - Personal consumer product having secured content object - Google Patents

Personal consumer product having secured content object Download PDF

Info

Publication number
WO2023061374A1
WO2023061374A1 PCT/CN2022/124675 CN2022124675W WO2023061374A1 WO 2023061374 A1 WO2023061374 A1 WO 2023061374A1 CN 2022124675 W CN2022124675 W CN 2022124675W WO 2023061374 A1 WO2023061374 A1 WO 2023061374A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
content object
product
machine
readable code
Prior art date
Application number
PCT/CN2022/124675
Other languages
French (fr)
Chinese (zh)
Inventor
斯通豪斯J·R
Original Assignee
宝洁公司
斯通豪斯J·R
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宝洁公司, 斯通豪斯J·R filed Critical 宝洁公司
Publication of WO2023061374A1 publication Critical patent/WO2023061374A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G21/00Arrangements not provided for by groups G03G13/00 - G03G19/00, e.g. cleaning, elimination of residual charge
    • G03G21/04Preventing copies being made of an original
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G2215/00Apparatus for electrophotographic processes
    • G03G2215/00362Apparatus for electrophotographic processes relating to the copy medium handling
    • G03G2215/00443Copy medium
    • G03G2215/00493Plastic
    • GPHYSICS
    • G03PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
    • G03GELECTROGRAPHY; ELECTROPHOTOGRAPHY; MAGNETOGRAPHY
    • G03G2215/00Apparatus for electrophotographic processes
    • G03G2215/00362Apparatus for electrophotographic processes relating to the copy medium handling
    • G03G2215/00443Copy medium
    • G03G2215/00523Other special types, e.g. tabbed

Definitions

  • the present disclosure relates to a personal consumer product having a security enabled content object, a method of authenticating the personal consumer product, and a computer system for authenticating the personal consumer product.
  • security patterns can be applied to security documents such as passports, identity cards, driver's licenses etc. to prevent copying, forgery, tampering etc. of the security documents.
  • Methods for generating such security patterns are disclosed in US Patent Publication US 10,710,393 B2 and International Patent Application Publication WO 2020/245290 A1. These patent documents are hereby incorporated by reference in their entirety.
  • a personal consumer product product having a security-enabled content object, by means of which the authenticity of the product can be discerned.
  • the present disclosure proposes a personal consumer product comprising: machine-readable code, and a security-enabling content object adjacent to the machine-readable code, wherein the security-enabling content object is determined according to the machine-readable code.
  • Figure 1A is a diagram illustrating a portion of an exemplary personal consumer goods product according to some embodiments of the present disclosure.
  • FIG. 1B-1D illustrate modifications of the markers shown in FIG. 1A , respectively.
  • FIGS. 2A and 2B illustrate diagrams of a portion of an exemplary personal consumer goods product, according to some embodiments of the present disclosure.
  • 3A-3C are diagrams illustrating a portion of an exemplary security-enabled content object according to some embodiments of the present disclosure.
  • Figure 4 is a flowchart illustrating an exemplary method of authenticating a personal consumable product according to some embodiments of the present disclosure.
  • FIG. 5 is a diagram illustrating a general hardware environment in which the present disclosure may be applied, according to some embodiments of the present disclosure.
  • the machine-readable code may include at least one of the following items: a barcode, a QR code, and a Data Matrix (Data Matrix) code.
  • the data matrix code may be a data matrix code defined by the ISO/IEC 16022 international standard. However, it should be understood that the present disclosure is not limited thereto.
  • a machine-readable code may include any machine-scannable code suitable for printing on a personal consumer product. It should be understood that a machine readable code may represent a single product or may represent a class of products.
  • the content object realizing security may include at least one of the following items: anti-copy pattern, latent image design, microtext, and security screening.
  • Security-enabling content objects are characterized as being easy to generate but difficult to replicate.
  • the copy prevention pattern may include micrographics.
  • the "circumferential direction" of the machine-readable code may refer to a direction along the outer circumference of the machine-readable code.
  • the "circumferential direction” of the machine-readable code may refer to a direction along the perimeter of the rectangle or square.
  • the "circumferential direction” of the machine-readable code may refer to a direction along the outer circumference of the circle.
  • references to numerical ranges are generally inclusive ranges.
  • “the range of 5%-30%” refers to the range of greater than or equal to 5% and less than or equal to 30%.
  • Figure 1A is a diagram illustrating a portion of an exemplary personal consumer goods product according to some embodiments of the present disclosure.
  • an exemplary personal consumer product product includes a barcode, and a security-enabling content object closely surrounding the barcode in a circumferential direction of the barcode.
  • the barcode includes: black and white bars, and barcode numbers.
  • the barcode also includes: a quiet zone, which refers to the empty space between the top and bottom of the shorter black bar and between the light boundary indicator, which is the number "4" on the left and the number "4" on the right The symbol ">".
  • the quiet zone is the area necessary for the scanning of barcodes.
  • the security-enabling content object includes a copy protection pattern. The anti-copy pattern surrounds and does not occupy the quiet area of the barcode.
  • the inner edge of the anti-copy pattern close to the quiet zone of the barcode coincides with the edge of the quiet zone of the barcode.
  • the distance between the edge of the anti-copy pattern close to the quiet zone of the barcode and the edge of the quiet zone of the barcode in a direction perpendicular to the circumferential direction is 0.
  • the anti-copy pattern has substantially the same width on one side of the barcode numerals as the width of the barcode numerals in a direction perpendicular to the circumferential direction (ie, vertical direction), and has a narrower width on the other three sides.
  • two widths that are substantially the same may refer to two widths whose difference falls within a range of ⁇ 10% of either width.
  • Barcodes and anti-copy patterns can be printed on all levels of packaging for consumer goods products. For example, taking shampoo products as an example, the barcode and anti-copy pattern can be printed on the bottle body (more specifically the label) of the shampoo product, or can be printed on the packaging box containing multiple shampoo products.
  • the anti-copy pattern surrounds the entire periphery of the quiet zone.
  • the anti-copy pattern surrounds a total length measured in the circumferential direction corresponding to 2 ⁇ radians relative to the geometric center of the quiet zone. It should be understood that it is not necessary that the anti-copy pattern surrounds the entire perimeter of the quiet zone.
  • the anti-copy pattern may only surround a part of the periphery of the quiet zone, for example, only surround one side of the quiet zone. Alternatively, the anti-copy pattern may surround more than 1/4 of the periphery of the quiet zone.
  • the anti-copy pattern may surround at least the distance measured in the circumferential direction relative to the geometric center of the square code.
  • the anti-copy pattern is determined based on the barcode.
  • the anti-copy pattern may be determined according to the numerical value represented by the barcode (ie, the barcode number). More specifically, the anti-copy pattern can be automatically generated by an ADOBE software plug-in according to the numerical value represented by the barcode (ie, the barcode number).
  • the software plug-in that can be used to generate the anti-copy pattern is not limited to the ADOBE software plug-in, but any suitable software plug-in can be used.
  • Examples of digital assembly systems that can be used to generate security-enabled content objects in this disclosure are: Fortuna TM from Agfa NV; Security Design Software from JURA TM , ONE from KBA TM and Arziro TM Design from Agfa NV.
  • a machine learning model determines whether the barcode matches the anti-copy pattern based on the image of the barcode and the anti-copy pattern to determine whether the consumer product product is a counterfeit product.
  • a machine learning model is trained using images of barcodes and anti-copy patterns of authentic products. It will be appreciated that, since the anti-copy pattern is disposed adjacent to the barcode, correction of distortion in the image of the anti-copy pattern would be advantageous, considering that the barcode consists mainly of vertical black and white bars. This, in turn, can improve the accuracy of identifying product authenticity. It should also be realized that additional printing of a copy protection pattern adjacent to the barcode would be a cost-effective printing operation for the product manufacturer.
  • the distance between the edge of the anti-copy pattern close to the quiet zone of the barcode and the edge of the quiet zone of the barcode in the direction perpendicular to the circumferential direction is 0.
  • the distance between the edge of the anti-copy pattern close to the quiet zone of the barcode and the edge of the quiet zone of the barcode in a direction perpendicular to the circumferential direction may be greater than or equal to 0 mm and less than or equal to 10 mm. If this distance is too large, say greater than 10 mm, then the space required to print both the barcode and the anti-copy pattern on the personal consumer product may unnecessarily increase.
  • the above-mentioned distance may be greater than or equal to 0 mm and less than or equal to 6 mm. Still alternatively, the above-mentioned distance may be greater than or equal to 0 mm and less than or equal to 3 mm.
  • the width of the anti-copy pattern on the barcode number side is substantially the same as the width of the barcode number.
  • the anti-copy pattern may have a width measured in a direction perpendicular to the circumferential direction of greater than or equal to 0.5 mm and less than or equal to 10 mm. If this width is less than 0.5 mm, the difficult-to-copy characteristic of the copy prevention pattern becomes weak. If this width is greater than 10 mm, then excessive space may be disadvantageously occupied. Alternatively, the aforementioned width may be greater than or equal to 2mm and less than or equal to 8mm.
  • the aforementioned width may be greater than or equal to 3 mm and less than or equal to 6 mm.
  • the anti-copy pattern surrounding the quiet zone of the barcode may have a uniform narrow width, such as 0.5mm-1mm, at four sides of the quiet zone. That is to say, the vertical width of the anti-copy pattern as the background of the barcode numbers can be smaller than the width of the barcode numbers, such as 75%, 50%, 25% of the width of the barcode numbers and so on.
  • the anti-copy pattern is continuous. However, the present disclosure is not limited thereto. In some embodiments of the present disclosure, the anti-copy pattern may be intermittent. In the example shown in FIG. 1A , both inner and outer edges of the anti-copy pattern have a rectangular shape, however the present disclosure is not limited thereto.
  • the anti-copy pattern can have any shape. It will be appreciated that the shape of the outer edge of the anti-copy pattern depends primarily on the size of the printing space provided on the packaging of the personal consumer goods product.
  • the ratio of the surface area between the anti-copy pattern and the barcode is in the range of 5%-30%.
  • the mark printed on the label of the shampoo product to be pasted on the bottle body as shown in FIG. 1 includes both a barcode and an anti-copy pattern. Having dimensions of eg 32 mm x 17 mm, wherein the anti-copy pattern may have eg a width of 3 mm on one side of the barcode number and eg a width of 0.5 mm-1 mm on the other three sides. If the ratio of the aforementioned surface area is less than 5%, the difficult-to-copy property of the copy prevention pattern becomes weak.
  • the ratio of the above-mentioned surface areas may be in the range of 10%-25%. Still alternatively, the ratio of the above surface areas may be in the range of 15%-20%.
  • an EAN-13 barcode is shown.
  • the present disclosure is not limited thereto.
  • the present disclosure can be applied to any barcode, such as EAN barcode, UPC barcode, Code 39 barcode and Code 128 barcode, etc.
  • the secured content objects include microtext associated with barcode numbers.
  • the barcode number "4987176 102003”
  • "102003” is the product code, and this code usually varies from product to product.
  • the security-enabling content object includes both a copy protection pattern and microtext associated with a barcode number. It is easy to understand that the security-implemented content object as shown in FIG. 1D is more difficult to be copied and reproduced, while it is possible to visually confirm whether the security-implemented content object matches the barcode.
  • the security-enabling content object may include microtext or micrographics associated with the name of the personal consumable product. Still taking the shampoo product as an example, the security-enabling content object may include miniature text such as "head&shoulders" or a miniature graphic such as a graphic mark unique to shampoo products. Similarly, this enables visual confirmation of the association between the barcode and the secured content object.
  • FIG. 2A and 2B illustrate diagrams of a portion of an exemplary personal consumer goods product, according to some embodiments of the present disclosure.
  • the personal consumer goods product includes: a QR code, and an anti-copy pattern closely surrounding the QR code in a circumferential direction of the QR code.
  • the personal consumer product includes: a data matrix code, and an anti-copy pattern closely surrounding the data matrix code in a circumferential direction of the data matrix code.
  • QR codes are increasingly printed on personal consumer products. Consumers can identify the authenticity of the product by scanning the QR code.
  • machine-readable codes such as QR codes and data matrix codes
  • images of both the machine-readable code and the security-enabled content object can be easily taken. For example, when a consumer scans a machine-readable code using an electronic device, such as a smartphone, the product manufacturer's server can obtain an image of both the machine-readable code and the content object enabling security.
  • FIGS. 3B and 3C are diagrams illustrating a portion of an exemplary security-enabled content object according to some embodiments of the present disclosure.
  • Fig. 3A illustrates in an enlarged manner an anti-copy pattern with an actual size of 19.5 mm x 5.5 mm.
  • Figure 3B illustrates, in an enlarged fashion, the microtext associated with the barcode numbers.
  • FIG. 3C illustrates a typical example of a security-enabled content object in an enlarged manner.
  • the secure-enabled content objects in FIGS. 3B and 3C have a length similar to the length of the secure-enabled content object in FIG. 3A .
  • the anti-duplication pattern has multiple variations per centimeter along the upper edge of the anti-duplication pattern.
  • the plurality of changes include: change from dot pattern to line pattern, change in thickness/direction/spacing/number of lines, change in size/interval/number of dots, change by dots and Changes in shape and position of local pattern elements formed by lines, etc.
  • the microtext has multiple changes per centimeter.
  • a plurality of repeated text elements "102003" with varying styles are included.
  • the plurality of changes include: the size, orientation, deformation mode, etc. of each text element.
  • the security-realizing content object as shown in FIG. 3C , along its upper edge, multiple types of partial pattern elements are continuously arranged. As shown in Figure 3C, the multiple changes along the upper edge include changes in the type (or style) of the local pattern elements.
  • Figures 3A-3C illustrate only some examples of content objects that implement security.
  • the present disclosure is not limited thereto.
  • the change of the content object to achieve security may also include: a change of color, a change of partial ink coverage, and the like.
  • a security-enabling content object may have an ink coverage of 10%-35%.
  • a security-enabling content object may have 15%-30% ink coverage.
  • a security-enabling content object may have 20%-25% ink coverage.
  • the "ink coverage” refers to the ratio of the area covered by ink to the area covered by the security-realizing content object among the security-realizing content objects printed on the package of the personal consumer goods product.
  • the area covered by the secured content object is equal to the sum of the area covered by the ink and the area of the white space within the secured content object. If the ink coverage is less than 10%, there may be less variation within the content object to achieve safety. If the ink coverage is higher than 35%, then a higher print resolution may be required.
  • first partial ink coverage in the first partial area may be different from the second partial ink coverage in the second partial area within the entire scope of the security-enabled content object.
  • the first partial area is different from the second partial area.
  • the local ink coverage ratio refers to the ratio of the ink coverage area in the local area to the area of the local area.
  • the security-enabling content object may be printed with one or more colors of ink, and at least one of the one or more colors may be lighter than the ink of the machine readable code .
  • the ink color of the machine readable code is black.
  • the security-enabling content object may be printed with ink of one or more colors, which may include yellow, for example. It is advantageous to use yellow to print at least a part of the security-enabling content object, because yellow is not easily noticed by the human eye and thus likely to be overlooked by counterfeiters, yet yellow is easily visible in the image of the security-implementing content object. have been seen.
  • the machine readable code may be printed with multiple colors of ink. In this case, at least one color used to print the security-enabling content object may be lighter than the darkest color employed by the machine-readable code.
  • L* in the CIEL*a*b* color space can be used to define lightness.
  • a higher L* value means a lighter color (L* values range from 0-100).
  • at least a portion of the security-enabling content object may be printed in one or more colors having an L* value that is more than 30 units less than the L* value of the machine readable code.
  • At least one of the machine-readable code and the security-enabling content object may have steganographic features.
  • steganographic features refer to alphanumeric, Graphics, structural features, etc.
  • the length (ie longest dimension) of the steganographic feature is from 0.02mm to 20mm, more preferably from 0.03mm to 5mm, still more preferably from 0.04mm to 1mm.
  • Non-limiting examples of such lengths include 0.03mm, 0.05mm, 0.07mm, 0.09mm, 0.1mm, 0.2mm, 0.3mm, 0.4mm, 0.5mm, and 0.6mm.
  • Various alphanumeric steganographic features and various graphical steganographic features are disclosed in US Patent Publication No.
  • the personal consumer product product may include: machine readable code, and a security-enabling content object proximate to the machine-readable code, wherein the security-enabling content object is determined from the machine-readable code.
  • the machine readable code may have any shape.
  • Content objects that implement security next to machine-readable code can also have arbitrary shapes.
  • the security-enabling content object may partially or completely surround the machine-readable code in a circumferential direction. The distance, measured in a direction perpendicular to the circumferential direction, between an edge of the content object close to the machine-readable code and an edge of the machine-readable code enabling security may be in the range of 0 mm to 10 mm.
  • the security-enabling content object may have a width measured in a direction perpendicular to the circumferential direction in the range of 0.5 mm to 10 mm.
  • the ratio of surface area between the content object and the machine readable code enabling security may be in the range of 5%-30%.
  • the secure-enabling content object has a variation of 1-30 per centimeter along the circumferential direction.
  • the security-enabling content object has a variation of 5-25 per centimeter along the circumferential direction at an edge of the security-enabling content object proximate to the machine readable code.
  • the security-enabling content object has 10-20 variations per centimeter along the circumferential direction at an edge of the security-enabling content object proximate to the machine readable code.
  • personal consumer products may include: hair care products, such as shampoo, conditioner, etc.; skin care products, such as body wash, skin lotion, etc.; laundry care products, such as laundry detergent, laundry detergent, Fabric softeners, laundry beads, etc.; hard surface care products, such as dishwashing detergents, floor cleaners, toilet cleaners, kitchen sink cleaners, etc.; air care products, such as air fresheners, fabric fresheners, etc.; scraper or razor products , such as razors, hair removal razors, etc.; toothbrush products with replaceable brush heads; oral care products, such as toothpaste, mouthwash, dental floss, toothpicks, etc.; feminine hygiene products, such as sanitary napkins, tampons, etc.; diaper products ;etc.
  • indicia comprising both machine-readable code and security-enabling content objects according to the present disclosure may be applied to virtually any suitable product.
  • FIG. 4 An exemplary method of authenticating a personal consumer product product according to some embodiments of the present disclosure is introduced with reference to FIG. 4 .
  • the authentication method as shown in FIG. 4 can be executed, for example, by a product manufacturer's server.
  • the server receives the machine-readable code and the image of the security-enabled content object.
  • a machine learning model is determined by using Genuine machine-readable codes and images of content objects that implement security are trained. Machine learning models are known concepts and will not be repeated here.
  • a personal consumer product product may have at least one locale corresponding to a security-enabling content object, which may be used to train a machine learning model.
  • a locale here refers to a small area with a pattern.
  • a region setting can have an area of 1 mm 2 -1 cm 2 , for example.
  • the at least one locale can vary from one content object implementing security to another.
  • the at least one locale can be shared by multiple consumer goods products.
  • the pattern within each locale of the at least one locale does not change, while the arrangement around each locale may vary. This allows the machine learning model to learn only both the locale and the machine readable code, regardless of changes in the content objects implementing security. It should be understood that the greater the number of regional settings, the more accurate the machine learning model's judgment (fake product judgment) is.
  • FIG. 5 is a diagram illustrating a general hardware environment in which the present disclosure may be applied, according to some embodiments of the present disclosure.
  • Computing device 500 may be any machine configured to perform processing and/or calculations, and may be, but is not limited to, a workstation, server, desktop computer, laptop computer, tablet computer, personal digital assistant, smart phone, portable camera, or any combination.
  • the above-mentioned server may be implemented in whole or at least in part by computing device 500 or similar devices or systems.
  • Computing device 500 may include elements capable of connecting to or communicating with bus 502 via one or more interfaces.
  • computing device 500 may include a bus 502 , one or more processors 504 , one or more input devices 506 , and one or more output devices 508 .
  • Processor(s) 504 may be any type of processor and may include, but is not limited to, one or more general purpose processors and/or one or more special purpose processors (such as application specific processing chips).
  • Input device 506 may be any type of device capable of entering information into a computing device, and may include, but is not limited to, a mouse, keyboard, touch screen, microphone, and/or remote control.
  • Output devices 508 may be any type of device capable of presenting information, and may include, but are not limited to, displays, speakers, video/audio output terminals, and/or printers.
  • Computing device 500 may also include or be connected to a non-transitory storage device 510, which may be any storage device that is non-transitory and that may implement a data repository, and may include, but is not limited to Disk drive, optical storage device, solid state storage device, floppy disk, flexible disk, hard disk, magnetic tape or any other magnetic medium, compact disk or any other optical medium, ROM (read only memory), RAM (random access memory), high speed Cache memory and/or any other memory chip or cartridge, and/or any other medium from which a computer can read data, instructions and/or code.
  • a non-transitory storage device 510 which may be any storage device that is non-transitory and that may implement a data repository, and may include, but is not limited to Disk drive, optical storage device, solid state storage device, floppy disk, flexible disk,
  • the non-transitory storage device 510 may be removable from the interface.
  • the non-transitory storage device 510 may have data/instructions/codes for implementing the above methods and steps.
  • Computing device 500 may also include communication device 512 .
  • the communication device 512 may be any type of device or system capable of communicating with external devices and/or with a network, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication equipment, and/or devices such as Bluetooth TM , 802.11 Chipsets for devices, WiFi devices, WiMax devices, cellular communications infrastructure, etc.
  • the bus 502 may include, but is not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnect (PCI) bus. bus.
  • ISA Industry Standard Architecture
  • MCA Micro Channel Architecture
  • EISA Enhanced ISA
  • VESA Video Electronics Standards Association
  • PCI Peripheral Component Interconnect
  • Computing device 500 may also include working memory 514, which may be any type of working memory that may store instructions and/or data useful for the operation of processor 504, and may include, but is not limited to, random access memory and/or Read-only memory device.
  • working memory 514 may be any type of working memory that may store instructions and/or data useful for the operation of processor 504, and may include, but is not limited to, random access memory and/or Read-only memory device.
  • Software elements may be located in working memory 514 including, but not limited to, operating system 516, one or more application programs 518, drivers, and/or other data and code. Instructions for performing the methods and steps described above may be included in one or more application programs 518 .
  • the executable code or source code of the instructions of the software elements may be stored in a non-transitory computer-readable storage medium (such as the above-mentioned storage device(s) 510), and may be compiled and/or installed It is read into the working memory 514. Executable or source code for instructions of a software element may also be downloaded from a remote location.
  • the present disclosure can be realized by software and necessary hardware, or can be realized by hardware, firmware and the like. Based on this understanding, the embodiments of the present disclosure may be partially implemented in the form of software.
  • the computer software can be stored in a computer-readable storage medium, such as a floppy disk, hard disk, optical disk or flash memory.
  • Computer software includes a series of instructions that cause a computer, such as a personal computer, kiosk or network terminal, to execute a method, or a part thereof, according to various embodiments of the present disclosure.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

Disclosed is a personal consumer product having a secured content object. The personal consumer product comprises a machine-readable code and a secured content object proximate to the machine-readable code, where the secured content object is determined according to the machine-readable code.

Description

具有实现安全的内容对象的个人消费品产品Consumer Goods Products with Content Objects Implementing Security
相关申请的交叉引用Cross References to Related Applications
本申请要求于2021年10月11日提交的名称为“具有实现安全的内容对象的个人消费品产品”的中国专利申请第202111179862.1号的优先权,该申请的公开通过引用被全部结合于此。This application claims priority to Chinese Patent Application No. 202111179862.1, filed on October 11, 2021, entitled "Personal Consumer Goods Product with Security-Enabling Content Objects," the disclosure of which is hereby incorporated by reference in its entirety.
技术领域technical field
本公开涉及具有实现安全的内容对象(security enabled content object)的个人消费品产品、对个人消费品产品进行认证的方法、和对个人消费品产品进行认证的计算机系统。The present disclosure relates to a personal consumer product having a security enabled content object, a method of authenticating the personal consumer product, and a computer system for authenticating the personal consumer product.
背景技术Background technique
对于制造商、分销商、零售商和最终的消费者而言,对个人消费品产品的伪造是一直存在的问题。一直需要适用于低利润的个人消费品产品的低成本的伪造检测方法。Counterfeiting of consumer goods products is an ongoing problem for manufacturers, distributors, retailers and ultimately consumers. There is a continuing need for low-cost counterfeit detection methods applicable to low-margin consumer goods products.
如已知的,安全图案可以被应用于诸如护照、身份证、驾驶执照等之类的安全文件,以防止对安全文件的复制、伪造、篡改等。在美国专利公开US10,710,393B2和国际专利申请公开WO2020/245290A1中公开了生成此类安全图案的方法。这些专利文献通过引用而被全文结合于此。As is known, security patterns can be applied to security documents such as passports, identity cards, driver's licenses etc. to prevent copying, forgery, tampering etc. of the security documents. Methods for generating such security patterns are disclosed in US Patent Publication US 10,710,393 B2 and International Patent Application Publication WO 2020/245290 A1. These patent documents are hereby incorporated by reference in their entirety.
发明内容Contents of the invention
根据本公开的一些实施例,提供一种具有实现安全的内容对象的个人消费品产品,凭借实现安全的内容对象,能够辨别产品的真伪。According to some embodiments of the present disclosure, there is provided a personal consumer product product having a security-enabled content object, by means of which the authenticity of the product can be discerned.
本公开提出了一种个人消费品产品,包括:机器可读代码,以及靠近机器可读代码的实现安全的内容对象,其中,实现安全的内容对象是根据机器可读代码而确定的。The present disclosure proposes a personal consumer product comprising: machine-readable code, and a security-enabling content object adjacent to the machine-readable code, wherein the security-enabling content object is determined according to the machine-readable code.
从参考附图的以下描述中,本公开其他特征和优点将变得清楚。Other features and advantages of the present disclosure will become apparent from the following description with reference to the accompanying drawings.
附图说明Description of drawings
并入说明书中并构成说明书的一部分的附图图示了本公开的实施例,并且与说明书一起用于解释本公开的原理而没有限制。在各图中,类似的标号用于表示类似的项目。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the principles of the disclosure and are not limiting. In the drawings, like reference numerals are used to denote like items.
图1A是图示出根据本公开一些实施例的示例性个人消费品产品的一部分的图。Figure 1A is a diagram illustrating a portion of an exemplary personal consumer goods product according to some embodiments of the present disclosure.
图1B-图1D分别图示出图1A所示的标记的变型例。1B-1D illustrate modifications of the markers shown in FIG. 1A , respectively.
图2A和图2B图示出根据本公开一些实施例的示例性个人消费品产品的一部分的图。2A and 2B illustrate diagrams of a portion of an exemplary personal consumer goods product, according to some embodiments of the present disclosure.
图3A-图3C是图示出根据本公开一些实施例的示例性实现安全的内容对象的一部分的图。3A-3C are diagrams illustrating a portion of an exemplary security-enabled content object according to some embodiments of the present disclosure.
图4是图示出根据本公开一些实施例的对个人消费品产品进行认证的示例性方法的流程图。Figure 4 is a flowchart illustrating an exemplary method of authenticating a personal consumable product according to some embodiments of the present disclosure.
图5是图示出根据本公开一些实施例的其中可应用本公开的一般硬件环境。FIG. 5 is a diagram illustrating a general hardware environment in which the present disclosure may be applied, according to some embodiments of the present disclosure.
具体实施方式Detailed ways
在以下详细描述中,阐述了许多具体细节以提供对所描述的示例性实施例的透彻理解。但是,对于本领域技术人员清楚的是,所描述的实施例可以在没有这些具体细节中的一些或全部的情况下进行实践。在所描述的示例性实施例中,为了避免不必要地模糊本公开的概念,没有详细描述众所周知的结构或处理步骤。In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the described exemplary embodiments. It will be apparent, however, to one skilled in the art that the described embodiments may be practiced without some or all of these specific details. In describing example embodiments, well-known structures or processing steps have not been described in detail to avoid unnecessarily obscuring the concepts of the present disclosure.
本公开中呈现的方法的步骤旨在是说明性的。在本公开的一些实施例中,该方法可以用未描述的一个或多个附加步骤来完成和/或在没有所讨论的一个或多个步骤的情况下完成。此外,方法的步骤被图示和描述的顺序并不旨在是限制性的。The steps of the methods presented in this disclosure are intended to be illustrative. In some embodiments of the present disclosure, the method can be accomplished with one or more additional steps not described and/or without one or more steps discussed. Furthermore, the order in which the steps of the methods are illustrated and described is not intended to be limiting.
在本公开中,机器可读代码可以包括以下项目中的至少一个:条形码、QR码、和数据矩阵(Data Matrix)码。这里,数据矩阵码可以是由ISO/IEC 16022国际标准定义的数据矩阵码。然而,应理解,本公开不限于此。机器可读代码可以包括适合印刷在个人消费品产品上的机器可扫描的任意代码。应理解,机器可读代码可以表示单个产品或者可以表示某一类产品。In the present disclosure, the machine-readable code may include at least one of the following items: a barcode, a QR code, and a Data Matrix (Data Matrix) code. Here, the data matrix code may be a data matrix code defined by the ISO/IEC 16022 international standard. However, it should be understood that the present disclosure is not limited thereto. A machine-readable code may include any machine-scannable code suitable for printing on a personal consumer product. It should be understood that a machine readable code may represent a single product or may represent a class of products.
在本公开中,实现安全的内容对象可以包括以下项目中的至少一个:防复制图案、潜影设计(latent image design)、缩微文本、和安全加网(security screening)。实现安全的内容对象的特征在于易于生成但是难于复制。在本公开中,防复制图案可以包括缩微图形。In the present disclosure, the content object realizing security may include at least one of the following items: anti-copy pattern, latent image design, microtext, and security screening. Security-enabling content objects are characterized as being easy to generate but difficult to replicate. In the present disclosure, the copy prevention pattern may include micrographics.
在本公开中,机器可读代码的“周向方向”可以指沿着机器可读代码的外周的方向。在机器可读代码具有矩形或正方形形状的情况下,机器可读代码的“周向方向”可以指沿着矩形或正方形的外周的方向。可替代地,在机器可读代码具有圆形形状的情况下,机器可读代码的“周向方向”可以指沿着圆形的外周的方向。In the present disclosure, the "circumferential direction" of the machine-readable code may refer to a direction along the outer circumference of the machine-readable code. Where the machine-readable code has a rectangular or square shape, the "circumferential direction" of the machine-readable code may refer to a direction along the perimeter of the rectangle or square. Alternatively, where the machine-readable code has a circular shape, the "circumferential direction" of the machine-readable code may refer to a direction along the outer circumference of the circle.
在本公开中,提及的数值范围通常是包含端点值的范围。比如,“5%-30%的范围”指大于等于5%且小于等于30%的范围。In this disclosure, references to numerical ranges are generally inclusive ranges. For example, "the range of 5%-30%" refers to the range of greater than or equal to 5% and less than or equal to 30%.
图1A是图示出根据本公开一些实施例的示例性个人消费品产品的一部分的图。Figure 1A is a diagram illustrating a portion of an exemplary personal consumer goods product according to some embodiments of the present disclosure.
如图1A所示,示例性个人消费品产品包括:条形码,以及在条形码的周向方向上靠近地围绕条形码的实现安全的内容对象。如图1A所示,条形码包括:黑条和白条,以及条形码数字。条形码还包括:静区,该静区指在较短的黑条的顶部和底部之间并且在光边界指示符之间的空白区域,光边界指示符是左侧的数字“4”和右侧的符号“>”。如已知的,静区是对条形码的扫描而言必要的区域。如图1A所示,实现安全的内容对象包括防复制图案。防复制图案围绕条形码的静区,并且不占据条形码的静区。一方面,防复制图案的靠近条形码的静区的内侧边缘与条形码的静区的边缘重合。换言之,防复制图案的靠近条形码的静区的边缘与条形码的静区的边缘在垂直于周向方向的方向(图1A中的水平方向或者竖直方向)上的距离为0。另一方面,防复制图案在条形码数字一侧具有与条形码数字在垂直于周向方向的方向(即竖直方向)上的宽度基本上相同的宽度,并且在另外三侧具有较窄的宽度。这里,基本上相同的两个宽度可以指:二者的差值落在任一个宽度的±10%的范围内的两个宽度。条形码和防复制图案可以印刷在个人消费品产品的各级包装上。例如,以洗发水产品为例,条形码和防复制图案可以印刷在洗发水产品的瓶身(更具体而言标签)上,或者可以印刷在装有多个洗发水产品的包装箱上。As shown in FIG. 1A , an exemplary personal consumer product product includes a barcode, and a security-enabling content object closely surrounding the barcode in a circumferential direction of the barcode. As shown in Figure 1A, the barcode includes: black and white bars, and barcode numbers. The barcode also includes: a quiet zone, which refers to the empty space between the top and bottom of the shorter black bar and between the light boundary indicator, which is the number "4" on the left and the number "4" on the right The symbol ">". As known, the quiet zone is the area necessary for the scanning of barcodes. As shown in FIG. 1A, the security-enabling content object includes a copy protection pattern. The anti-copy pattern surrounds and does not occupy the quiet area of the barcode. On the one hand, the inner edge of the anti-copy pattern close to the quiet zone of the barcode coincides with the edge of the quiet zone of the barcode. In other words, the distance between the edge of the anti-copy pattern close to the quiet zone of the barcode and the edge of the quiet zone of the barcode in a direction perpendicular to the circumferential direction (horizontal direction or vertical direction in FIG. 1A ) is 0. On the other hand, the anti-copy pattern has substantially the same width on one side of the barcode numerals as the width of the barcode numerals in a direction perpendicular to the circumferential direction (ie, vertical direction), and has a narrower width on the other three sides. Here, two widths that are substantially the same may refer to two widths whose difference falls within a range of ±10% of either width. Barcodes and anti-copy patterns can be printed on all levels of packaging for consumer goods products. For example, taking shampoo products as an example, the barcode and anti-copy pattern can be printed on the bottle body (more specifically the label) of the shampoo product, or can be printed on the packaging box containing multiple shampoo products.
在图1A所示的例子中,防复制图案围绕静区的整个外周。换言之,防复制图案围绕在周向方向上测得的与相对于静区的几何中心的2π弧度对应的总长度。应理解,防复制图案围绕静区的整个外周不是必需的。在本公开的一些实施例中,如图1B所示,防复制图案可以仅围绕静区的一部分外周,比如仅围绕静区的一条边。可替代地,防复制图案可以围绕静区的1/4以上的外周。In the example shown in FIG. 1A, the anti-copy pattern surrounds the entire periphery of the quiet zone. In other words, the anti-copy pattern surrounds a total length measured in the circumferential direction corresponding to 2π radians relative to the geometric center of the quiet zone. It should be understood that it is not necessary that the anti-copy pattern surrounds the entire perimeter of the quiet zone. In some embodiments of the present disclosure, as shown in FIG. 1B , the anti-copy pattern may only surround a part of the periphery of the quiet zone, for example, only surround one side of the quiet zone. Alternatively, the anti-copy pattern may surround more than 1/4 of the periphery of the quiet zone.
在本公开的一些实施例中,在机器可读代码是比如QR码之类的正方形代码的情况下,防复制图案可以至少围绕在周向方向上测得的与相对于正方形代码的几何中心的π/2弧度对应的总长度。即,防复制图案可以至少围绕正方形代码的一条边。In some embodiments of the present disclosure, where the machine-readable code is a square code such as a QR code, the anti-copy pattern may surround at least the distance measured in the circumferential direction relative to the geometric center of the square code. The total length corresponding to π/2 radians. That is, the anti-copy pattern may surround at least one side of the square code.
在图1A所示的例子中,防复制图案是根据条形码而确定的。防复制图案可以是根据条形码所代表的数字值(即条形码数字)而确定的。更具体而言,防复制图案可以是根据条形码所代表的数字值(即条形码数字)由ADOBE软件插件自动生成的。应注意,可用来生成防复制图案的软件插件不限于ADOBE软件插件,而是可以使用任意适当的软件插件。在本公开中,可用来生成实现安全的内容对象的数字组装系统的例子是:Agfa NV的Fortuna TM;JURA TM的安全设计软件、KBA TM的ONE以及Agfa NV的Arziro TM设计。 In the example shown in FIG. 1A, the anti-copy pattern is determined based on the barcode. The anti-copy pattern may be determined according to the numerical value represented by the barcode (ie, the barcode number). More specifically, the anti-copy pattern can be automatically generated by an ADOBE software plug-in according to the numerical value represented by the barcode (ie, the barcode number). It should be noted that the software plug-in that can be used to generate the anti-copy pattern is not limited to the ADOBE software plug-in, but any suitable software plug-in can be used. Examples of digital assembly systems that can be used to generate security-enabled content objects in this disclosure are: Fortuna from Agfa NV; Security Design Software from JURA , ONE from KBA and Arziro Design from Agfa NV.
通过靠近条形码设置与条形码相关联的防复制图案,使得伪造者难以对相关联的条形码和防复制图案二者进行复制和再现。如之前提及的,由于防复制图案的易于生成但难于复制的特征,伪造者对其进行复制和再现会是困难的。By placing the anti-copy pattern associated with the barcode close to the barcode, it is made difficult for a counterfeiter to copy and reproduce both the associated barcode and the anti-copy pattern. As mentioned before, due to the easy-to-generate but difficult-to-copy feature of the anti-copy pattern, it can be difficult for a counterfeiter to copy and reproduce it.
另一方面,对于产品制造商而言,通过识别条形码与防复制图案之间的关联性,能够确定产品的真伪。在本公开的一些实施例中,由机器学习模型基于条形码和防复制图案的图像来确定条形码与防复制图案是否匹配,从而确定个人消费品产品是否是伪造产品。这里,机器学习模型是通过使用真品的条形码和防复制图案的图像来训练的。应认识到,由于防复制图案设置在条形码附近,考虑到条形码主要由竖直的黑条和白条构成,所以对防复制图案的图像中变形的校正会是有利的。这进而能够提高对产品真伪的识别准确度。还应认识到,对于产品制造商而言,在条形码附近额外地印刷防复制图案,这种印刷操作会是低成本的。On the other hand, for the product manufacturer, by identifying the correlation between the barcode and the anti-copy pattern, the authenticity of the product can be determined. In some embodiments of the present disclosure, a machine learning model determines whether the barcode matches the anti-copy pattern based on the image of the barcode and the anti-copy pattern to determine whether the consumer product product is a counterfeit product. Here, a machine learning model is trained using images of barcodes and anti-copy patterns of authentic products. It will be appreciated that, since the anti-copy pattern is disposed adjacent to the barcode, correction of distortion in the image of the anti-copy pattern would be advantageous, considering that the barcode consists mainly of vertical black and white bars. This, in turn, can improve the accuracy of identifying product authenticity. It should also be realized that additional printing of a copy protection pattern adjacent to the barcode would be a cost-effective printing operation for the product manufacturer.
在图1A所示的例子中,防复制图案的靠近条形码的静区的边缘与条形码的静区的边缘在垂直于周向方向的方向上的距离为0。然而本公开不限于此。防复制图案的靠近条形码的静区的边缘与条形码的静区的边缘在垂直于周向方向的方向上的距离可以大于等于0mm并且小于等于10mm。如果这个距离过大,比如大于10mm,那么可能不必要地增大在个人消费品产品上印刷条形码和防复制图案二者所需的空间。可替代地,上述距离可以大于等于0mm并且小于等于6mm。又可替代地,上述距离可以大于等于0mm并且小于等于3mm。In the example shown in FIG. 1A , the distance between the edge of the anti-copy pattern close to the quiet zone of the barcode and the edge of the quiet zone of the barcode in the direction perpendicular to the circumferential direction is 0. However, the present disclosure is not limited thereto. The distance between the edge of the anti-copy pattern close to the quiet zone of the barcode and the edge of the quiet zone of the barcode in a direction perpendicular to the circumferential direction may be greater than or equal to 0 mm and less than or equal to 10 mm. If this distance is too large, say greater than 10 mm, then the space required to print both the barcode and the anti-copy pattern on the personal consumer product may unnecessarily increase. Alternatively, the above-mentioned distance may be greater than or equal to 0 mm and less than or equal to 6 mm. Still alternatively, the above-mentioned distance may be greater than or equal to 0 mm and less than or equal to 3 mm.
在图1A所示的例子中,防复制图案的在条形码数字一侧的宽度与条形码数字的宽度基本上相同。然而本公开不限于此。在本公开的一些实施例中,防复制图案的在沿着垂直于周向方向的方向上测得的宽度可以大于等于0.5mm并且小于等于10mm。如果这个宽度小于0.5mm,那么防复制图案的难于复制的特性变弱。如果这个宽度大于10mm,那么可能不利地占据了过大的空间。可替代地,上述宽度可以大 于等于2mm并且小于等于8mm。又可替代地,上述宽度可以大于等于3mm并且小于等于6mm。在本公开的一些实施例中,环绕条形码的静区的防复制图案在静区的四条边处可以具有均一的窄宽度,比如0.5mm-1mm。也就是说,作为条形码数字的背景的防复制图案的在竖直方向上的宽度可以小于条形码数字的宽度,比如是条形码数字的宽度的75%、50%、25%等等。In the example shown in FIG. 1A, the width of the anti-copy pattern on the barcode number side is substantially the same as the width of the barcode number. However, the present disclosure is not limited thereto. In some embodiments of the present disclosure, the anti-copy pattern may have a width measured in a direction perpendicular to the circumferential direction of greater than or equal to 0.5 mm and less than or equal to 10 mm. If this width is less than 0.5 mm, the difficult-to-copy characteristic of the copy prevention pattern becomes weak. If this width is greater than 10 mm, then excessive space may be disadvantageously occupied. Alternatively, the aforementioned width may be greater than or equal to 2mm and less than or equal to 8mm. Still alternatively, the aforementioned width may be greater than or equal to 3 mm and less than or equal to 6 mm. In some embodiments of the present disclosure, the anti-copy pattern surrounding the quiet zone of the barcode may have a uniform narrow width, such as 0.5mm-1mm, at four sides of the quiet zone. That is to say, the vertical width of the anti-copy pattern as the background of the barcode numbers can be smaller than the width of the barcode numbers, such as 75%, 50%, 25% of the width of the barcode numbers and so on.
在图1A所示的例子中,防复制图案是连续的。然而本公开不限于此。在本公开的一些实施例中,防复制图案可以是间断的。在图1A所示的例子中,防复制图案的内侧边缘和外侧边缘均具有矩形形状,然而本公开不限于此。防复制图案可以具有任意的形状。应理解,防复制图案的外侧边缘的形状主要取决于个人消费品产品的包装上所提供的印刷空间的尺寸。In the example shown in FIG. 1A, the anti-copy pattern is continuous. However, the present disclosure is not limited thereto. In some embodiments of the present disclosure, the anti-copy pattern may be intermittent. In the example shown in FIG. 1A , both inner and outer edges of the anti-copy pattern have a rectangular shape, however the present disclosure is not limited thereto. The anti-copy pattern can have any shape. It will be appreciated that the shape of the outer edge of the anti-copy pattern depends primarily on the size of the printing space provided on the packaging of the personal consumer goods product.
在本公开的一些实施例中,防复制图案与条形码之间的表面积的比率在5%-30%的范围内。在本公开的一些实施例中,以洗发水产品为例,印刷到洗发水产品的要粘贴到瓶身的标签上的如图1所示的包括条形码和防复制图案二者的标记(mark)具有例如32mm×17mm的尺寸,其中,防复制图案在条形码数字一侧可以具有例如3mm的宽度并且在另外三侧具有例如0.5mm-1mm的宽度。如果前述表面积的比率小于5%,那么防复制图案的难于复制的特性变弱。如果前述比率大于30%,那么可能不利地占据了过大的空间。可替代地,上述表面积的比率可以在10%-25%的范围内。又可替代地,上述表面积的比率可以在15%-20%的范围内。In some embodiments of the present disclosure, the ratio of the surface area between the anti-copy pattern and the barcode is in the range of 5%-30%. In some embodiments of the present disclosure, taking the shampoo product as an example, the mark printed on the label of the shampoo product to be pasted on the bottle body as shown in FIG. 1 includes both a barcode and an anti-copy pattern. Having dimensions of eg 32 mm x 17 mm, wherein the anti-copy pattern may have eg a width of 3 mm on one side of the barcode number and eg a width of 0.5 mm-1 mm on the other three sides. If the ratio of the aforementioned surface area is less than 5%, the difficult-to-copy property of the copy prevention pattern becomes weak. If the aforementioned ratio is greater than 30%, an excessive space may be disadvantageously occupied. Alternatively, the ratio of the above-mentioned surface areas may be in the range of 10%-25%. Still alternatively, the ratio of the above surface areas may be in the range of 15%-20%.
在图1A所示的例子中,示出了EAN-13条形码。然而本公开并不限于此。本公开可以适用于任何的条形码,比如EAN条形码、UPC条形码、Code 39条形码和Code 128条形码、等等。In the example shown in Figure 1A, an EAN-13 barcode is shown. However, the present disclosure is not limited thereto. The present disclosure can be applied to any barcode, such as EAN barcode, UPC barcode, Code 39 barcode and Code 128 barcode, etc.
图1C和图1D图示出图1A所示的标记的变型例。在图1C所示的例子中,实现安全的内容对象包括与条形码数字相关联的缩微文本。如已知的,在条形码数字“4987176 102003”中,“102003”是产品代码,此代码通常随产品的不同而不同。通过在实现安全的内容对象中包含产品代码“102003”,能够直观地确认条形码与实现安全的内容对象之间的关联性。在图1D所示的例子中,实现安全的内容对象包括防复制图案以及与条形码数字相关联的缩微文本二者。容易理解,如图1D所示的实现安全的内容对象更加难以被复制和再现,同时能够直观地确认实现安全的内容对象是否与条形码匹配。1C and 1D illustrate variations of the markers shown in FIG. 1A. In the example shown in FIG. 1C, the secured content objects include microtext associated with barcode numbers. As you know, in the barcode number "4987176 102003", "102003" is the product code, and this code usually varies from product to product. By including the product code "102003" in the security-realized content object, the association between the barcode and the security-realized content object can be visually confirmed. In the example shown in Figure ID, the security-enabling content object includes both a copy protection pattern and microtext associated with a barcode number. It is easy to understand that the security-implemented content object as shown in FIG. 1D is more difficult to be copied and reproduced, while it is possible to visually confirm whether the security-implemented content object matches the barcode.
在本公开的一些实施例中,实现安全的内容对象可以包括与个人消费品产品的 名称相关联的缩微文本或缩微图形。仍以洗发水产品为例,实现安全的内容对象可以包括诸如“head&shoulders”之类的缩微文本或者诸如洗发水产品特有的图形标记之类的缩微图形。类似地,这使得能够直观地确认条形码与实现安全的内容对象之间的关联性。In some embodiments of the present disclosure, the security-enabling content object may include microtext or micrographics associated with the name of the personal consumable product. Still taking the shampoo product as an example, the security-enabling content object may include miniature text such as "head&shoulders" or a miniature graphic such as a graphic mark unique to shampoo products. Similarly, this enables visual confirmation of the association between the barcode and the secured content object.
图2A和图2B图示出根据本公开一些实施例的示例性个人消费品产品的一部分的图。如图2A所示,个人消费品产品包括:QR码,以及在QR码的周向方向上靠近地围绕QR码的防复制图案。如图2B所示,个人消费品产品包括:数据矩阵码,以及在数据矩阵码的周向方向上靠近地围绕数据矩阵码的防复制图案。2A and 2B illustrate diagrams of a portion of an exemplary personal consumer goods product, according to some embodiments of the present disclosure. As shown in FIG. 2A , the personal consumer goods product includes: a QR code, and an anti-copy pattern closely surrounding the QR code in a circumferential direction of the QR code. As shown in FIG. 2B , the personal consumer product includes: a data matrix code, and an anti-copy pattern closely surrounding the data matrix code in a circumferential direction of the data matrix code.
目前,二维码被越来越多地印刷在个人消费品产品上。消费者可以通过扫描二维码来辨别产品的真伪。通过将实现安全的内容对象布置在诸如QR码和数据矩阵码之类的机器可读代码附近,使得能够容易地取得机器可读代码和实现安全的内容对象二者的图像。比如,在消费者使用电子设备(比如智能手机)扫描机器可读代码时,产品制造商的服务器能够取得机器可读代码和实现安全的内容对象二者的图像。Currently, QR codes are increasingly printed on personal consumer products. Consumers can identify the authenticity of the product by scanning the QR code. By arranging the security-enabled content object near machine-readable codes such as QR codes and data matrix codes, images of both the machine-readable code and the security-enabled content object can be easily taken. For example, when a consumer scans a machine-readable code using an electronic device, such as a smartphone, the product manufacturer's server can obtain an image of both the machine-readable code and the content object enabling security.
图3A-图3C是图示出根据本公开一些实施例的示例性实现安全的内容对象的一部分的图。图3A以放大的方式图示出实际尺寸为19.5mm×5.5mm的防复制图案。图3B以放大的方式图示出与条形码数字相关联的缩微文本。图3C以放大的方式图示出实现安全的内容对象的一个典型例子。图3B和图3C中的实现安全的内容对象具有与图3A中的实现安全的内容对象的长度类似的长度。3A-3C are diagrams illustrating a portion of an exemplary security-enabled content object according to some embodiments of the present disclosure. Fig. 3A illustrates in an enlarged manner an anti-copy pattern with an actual size of 19.5 mm x 5.5 mm. Figure 3B illustrates, in an enlarged fashion, the microtext associated with the barcode numbers. FIG. 3C illustrates a typical example of a security-enabled content object in an enlarged manner. The secure-enabled content objects in FIGS. 3B and 3C have a length similar to the length of the secure-enabled content object in FIG. 3A .
如图3A所示,沿着防复制图案的上边缘,防复制图案每厘米具有多个变化。在图3A所示的防复制图案中,具有由点和线形成的局部图案元素。沿着防复制图案的上边缘,所述多个变化包括:从点图案到线图案的变化、线的粗细/方向/间距/数量的变化、点的大小/间隔/数量的变化、由点和线形成的局部图案元素的形状和位置的变化等等。As shown in FIG. 3A, the anti-duplication pattern has multiple variations per centimeter along the upper edge of the anti-duplication pattern. In the copy prevention pattern shown in FIG. 3A, there are partial pattern elements formed of dots and lines. Along the upper edge of the anti-copy pattern, the plurality of changes include: change from dot pattern to line pattern, change in thickness/direction/spacing/number of lines, change in size/interval/number of dots, change by dots and Changes in shape and position of local pattern elements formed by lines, etc.
如图3B所示,沿着缩微文本的上边缘,缩微文本每厘米具有多个变化。在图3B所示的缩微文本中,包括多个重复的样式变化的文本元素“102003”。沿着缩微文本的上边缘,所述多个变化包括:各个文本元素的大小、朝向、变形方式等等。As shown in Figure 3B, along the upper edge of the microtext, the microtext has multiple changes per centimeter. In the microtext shown in FIG. 3B , a plurality of repeated text elements "102003" with varying styles are included. Along the upper edge of the microtext, the plurality of changes include: the size, orientation, deformation mode, etc. of each text element.
在如图3C所示的实现安全的内容对象中,沿着其上边缘,连续排列了多个类型的局部图案元素。如图3C所示,沿着上边缘的多个变化包括:局部图案元素的类型(或者样式)的变化。In the security-realizing content object as shown in FIG. 3C , along its upper edge, multiple types of partial pattern elements are continuously arranged. As shown in Figure 3C, the multiple changes along the upper edge include changes in the type (or style) of the local pattern elements.
应理解,图3A-图3C仅仅示出了实现安全的内容对象的一些例子。本公开不限 于此。比如,实现安全的内容对象的变化还可以包括:颜色的变化、局部墨水覆盖率的变化等等。It should be understood that Figures 3A-3C illustrate only some examples of content objects that implement security. The present disclosure is not limited thereto. For example, the change of the content object to achieve security may also include: a change of color, a change of partial ink coverage, and the like.
还应理解,通过在实现安全的内容对象内包括多个变化,比如在其纵向方向上包括多个变化,这使得实现安全的内容对象难以被复制和再现。It should also be appreciated that by including multiple variations within the secure content object, such as in its longitudinal direction, this makes the secure content object difficult to copy and reproduce.
还应理解,实际上,已知的各种安全图案均可以应用于本公开中。比如,在美国专利公开US10,710,393B2和国际专利申请公开WO2020/245290A1中公开的各种安全图案可以应用到本公开中的实现安全的内容对象中。比如,扭索纹、几何重复图案等可以应用到本公开中的实现安全的内容对象中。It should also be understood that, in fact, various known security patterns can be applied in the present disclosure. For example, various security patterns disclosed in US Patent Publication No. 10,710,393B2 and International Patent Application Publication WO2020/245290A1 can be applied to content objects implementing security in the present disclosure. For example, guilloché, geometric repeating patterns, and the like can be applied to the content objects implementing security in the present disclosure.
在本公开的一些实施例中,实现安全的内容对象可以具有10%-35%的墨水覆盖率。可替代地,实现安全的内容对象可以具有15%-30%的墨水覆盖率。又可替代地,实现安全的内容对象可以具有20%-25%的墨水覆盖率。这里,“墨水覆盖率”指:在印刷在个人消费品产品的包装上的实现安全的内容对象之中,由墨水覆盖的面积与由实现安全的内容对象覆盖的面积之比。由实现安全的内容对象覆盖的面积等于由墨水覆盖的面积与在实现安全的内容对象内的空白的面积之和。如果墨水覆盖率低于10%,那么在实现安全的内容对象内的变化可能较少。如果墨水覆盖率高于35%,那么可能要求较高的印刷分辨率。In some embodiments of the present disclosure, a security-enabling content object may have an ink coverage of 10%-35%. Alternatively, a security-enabling content object may have 15%-30% ink coverage. Yet alternatively, a security-enabling content object may have 20%-25% ink coverage. Here, the "ink coverage" refers to the ratio of the area covered by ink to the area covered by the security-realizing content object among the security-realizing content objects printed on the package of the personal consumer goods product. The area covered by the secured content object is equal to the sum of the area covered by the ink and the area of the white space within the secured content object. If the ink coverage is less than 10%, there may be less variation within the content object to achieve safety. If the ink coverage is higher than 35%, then a higher print resolution may be required.
应理解,在整个的实现安全的内容对象的范围内,第一局部区域内的第一局部墨水覆盖率可以不同于第二局部区域内的第二局部墨水覆盖率。第一局部区域与第二局部区域不同。应理解,局部墨水覆盖率指局部区域内的墨水覆盖面积与局部区域的面积之比。It should be understood that the first partial ink coverage in the first partial area may be different from the second partial ink coverage in the second partial area within the entire scope of the security-enabled content object. The first partial area is different from the second partial area. It should be understood that the local ink coverage ratio refers to the ratio of the ink coverage area in the local area to the area of the local area.
在本公开的一些实施例中,实现安全的内容对象可以由一个或多个颜色的墨水印刷,并且,这一个或多个颜色中的至少一个墨水颜色可以比机器可读代码的墨水的颜色浅。通常,机器可读代码的墨水的颜色是黑色。实现安全的内容对象可以由一个或多个颜色的墨水来印刷,这一个或多个颜色例如可以包括黄色。使用黄色来印刷至少一部分的实现安全的内容对象是有利的,这是因为黄色不容易被人眼注意到,因而很可能被伪造者忽视,然而,黄色在实现安全的内容对象的图像中很容易被看到。在一些情况下,机器可读代码可能由多个颜色的墨水印刷。在这种情况下,用于印刷实现安全的内容对象的至少一种颜色可以比机器可读代码所采用的最深的颜色浅。In some embodiments of the present disclosure, the security-enabling content object may be printed with one or more colors of ink, and at least one of the one or more colors may be lighter than the ink of the machine readable code . Typically, the ink color of the machine readable code is black. The security-enabling content object may be printed with ink of one or more colors, which may include yellow, for example. It is advantageous to use yellow to print at least a part of the security-enabling content object, because yellow is not easily noticed by the human eye and thus likely to be overlooked by counterfeiters, yet yellow is easily visible in the image of the security-implementing content object. have been seen. In some cases, the machine readable code may be printed with multiple colors of ink. In this case, at least one color used to print the security-enabling content object may be lighter than the darkest color employed by the machine-readable code.
应理解,在CIEL*a*b*色彩空间中的“L*”值可用于定义亮度。较高的L*值意 味着颜色更浅(L*值的范围是0-100)。在一些实施例中,可以采用具有与机器可读代码的L*值相比小30个单位以上的L*值的一个或多个颜色来印刷实现安全的内容对象的至少一部分。It should be understood that the "L*" value in the CIEL*a*b* color space can be used to define lightness. A higher L* value means a lighter color (L* values range from 0-100). In some embodiments, at least a portion of the security-enabling content object may be printed in one or more colors having an L* value that is more than 30 units less than the L* value of the machine readable code.
在本公开的一些实施例中,机器可读代码和实现安全的内容对象中的至少一个可以具有隐写(steganographic)特征。在本公开中,隐写特征指被有意地添加到机器可读代码和实现安全的内容对象中的至少一个中以便在个人消费品产品上清晰可见且可检测但优选地不引起注意的字母数字、图形、结构特征等。隐写特征的长度(即最长尺寸)为0.02mm至20mm,更优选地为0.03mm至5mm,还更优选地为0.04mm至1mm。该长度的非限制性示例包括0.03mm、0.05mm、0.07mm、0.09mm、0.1mm、0.2mm、0.3mm、0.4mm、0.5mm和0.6mm。在美国专利公开US11,074,592B2中公开了多种字母数字隐写特征以及多种图形隐写特征,这些隐写特征可以被应用于本公开的机器可读代码和实现安全的内容对象中的至少一个。该美国专利公开通过引用被全文结合于此。应理解,通过对于机器可读代码和实现安全的内容对象中的至少一个应用隐写特征,根据本公开的标记的难于复制的特性被增强。In some embodiments of the present disclosure, at least one of the machine-readable code and the security-enabling content object may have steganographic features. In this disclosure, steganographic features refer to alphanumeric, Graphics, structural features, etc. The length (ie longest dimension) of the steganographic feature is from 0.02mm to 20mm, more preferably from 0.03mm to 5mm, still more preferably from 0.04mm to 1mm. Non-limiting examples of such lengths include 0.03mm, 0.05mm, 0.07mm, 0.09mm, 0.1mm, 0.2mm, 0.3mm, 0.4mm, 0.5mm, and 0.6mm. Various alphanumeric steganographic features and various graphical steganographic features are disclosed in US Patent Publication No. 11,074,592 B2, which can be applied to at least one. This US patent publication is hereby incorporated by reference in its entirety. It will be appreciated that by applying a steganographic feature to at least one of the machine-readable code and the security-enabling content object, the difficult-to-copy properties of the markers according to the present disclosure are enhanced.
在本公开的一些实施例中,个人消费品产品可以包括:机器可读代码,以及靠近机器可读代码的实现安全的内容对象,其中,实现安全的内容对象是根据机器可读代码而确定的。这里,机器可读代码可以具有任意的形状。靠近机器可读代码的实现安全的内容对象也可以具有任意的形状。实现安全的内容对象可以在周向方向上部分地或完全地围绕机器可读代码。实现安全的内容对象的靠近机器可读代码的边缘与机器可读代码的边缘之间的在垂直于周向方向的方向上测得的距离可以在0mm到10mm的范围内。实现安全的内容对象的沿着垂直于周向方向的方向测得的宽度可以在0.5mm到10mm的范围内。实现安全的内容对象与机器可读代码之间的表面积的比率可以在5%-30%的范围内。在接近机器可读代码的实现安全的内容对象的边缘处,实现安全的内容对象沿着周向方向每厘米具有1-30个变化。这些变化例如可以包括:局部图案元素的变化、重复的缩微文本元素或缩微图形元素的样式的变化、颜色的变化、局部墨水覆盖率的变化等等。可替代地,在接近机器可读代码的实现安全的内容对象的边缘处,实现安全的内容对象沿着周向方向每厘米具有5-25个变化。又可替代地,在接近机器可读代码的实现安全的内容对象的边缘处,实现安全的内容对象沿着周向方向每厘米具有10-20个变化。In some embodiments of the present disclosure, the personal consumer product product may include: machine readable code, and a security-enabling content object proximate to the machine-readable code, wherein the security-enabling content object is determined from the machine-readable code. Here, the machine readable code may have any shape. Content objects that implement security next to machine-readable code can also have arbitrary shapes. The security-enabling content object may partially or completely surround the machine-readable code in a circumferential direction. The distance, measured in a direction perpendicular to the circumferential direction, between an edge of the content object close to the machine-readable code and an edge of the machine-readable code enabling security may be in the range of 0 mm to 10 mm. The security-enabling content object may have a width measured in a direction perpendicular to the circumferential direction in the range of 0.5 mm to 10 mm. The ratio of surface area between the content object and the machine readable code enabling security may be in the range of 5%-30%. At the edge of the secure-enabling content object near the machine-readable code, the secure-enabling content object has a variation of 1-30 per centimeter along the circumferential direction. These changes may include, for example: changes in local pattern elements, changes in the style of repeated microtext elements or micrographic elements, changes in color, changes in local ink coverage, and the like. Alternatively, the security-enabling content object has a variation of 5-25 per centimeter along the circumferential direction at an edge of the security-enabling content object proximate to the machine readable code. Yet alternatively, the security-enabling content object has 10-20 variations per centimeter along the circumferential direction at an edge of the security-enabling content object proximate to the machine readable code.
应理解,在本公开中,个人消费品产品可以包括:头发护理产品,比如洗发水、护发素等;皮肤护理产品,比如沐浴露、护肤乳等;洗衣护理产品,比如洗衣粉、洗衣液、织物柔顺剂、洗衣香珠等;硬表面护理产品,比如餐具洗涤剂、地板清洁剂、洁厕剂、厨房水槽清洁剂等;空气养护产品,比如空气清新剂、织物清新剂等;刮刀或剃刀产品,比如剃须刀、毛发去除剃刀等;可更换刷头的牙刷产品;口腔护理产品,比如牙膏、漱口水、牙线、牙签等;女性卫生产品,比如卫生巾、卫生棉条等;纸尿裤产品;等等。还应理解,根据本公开的包括机器可读代码和实现安全的内容对象二者的标记实际上可以应用于任意合适的产品。It should be understood that in this disclosure, personal consumer products may include: hair care products, such as shampoo, conditioner, etc.; skin care products, such as body wash, skin lotion, etc.; laundry care products, such as laundry detergent, laundry detergent, Fabric softeners, laundry beads, etc.; hard surface care products, such as dishwashing detergents, floor cleaners, toilet cleaners, kitchen sink cleaners, etc.; air care products, such as air fresheners, fabric fresheners, etc.; scraper or razor products , such as razors, hair removal razors, etc.; toothbrush products with replaceable brush heads; oral care products, such as toothpaste, mouthwash, dental floss, toothpicks, etc.; feminine hygiene products, such as sanitary napkins, tampons, etc.; diaper products ;etc. It should also be understood that indicia comprising both machine-readable code and security-enabling content objects according to the present disclosure may be applied to virtually any suitable product.
接下来,参考图4介绍根据本公开一些实施例的对个人消费品产品进行认证的示例性方法。如图4所示的认证方法例如可以由产品制造商的服务器来执行。Next, an exemplary method of authenticating a personal consumer product product according to some embodiments of the present disclosure is introduced with reference to FIG. 4 . The authentication method as shown in FIG. 4 can be executed, for example, by a product manufacturer's server.
在步骤S410处,服务器接收机器可读代码和实现安全的内容对象的图像。At step S410, the server receives the machine-readable code and the image of the security-enabled content object.
在步骤S420处,在服务器处,由机器学习模型基于所接收的图像来确定机器可读代码与实现安全的内容对象是否匹配,从而确定个人消费品是否是伪造产品,其中,机器学习模型是通过使用真品的机器可读代码和实现安全的内容对象的图像来训练的。机器学习模型是已知的概念,在此不再赘述。At step S420, at the server, a machine learning model is determined by using Genuine machine-readable codes and images of content objects that implement security are trained. Machine learning models are known concepts and will not be repeated here.
在本公开的一些实施例中,个人消费品产品可以具有与实现安全的内容对象对应的至少一个区域设置(locale),这至少一个区域设置可以用于对机器学习模型进行训练。这里的区域设置指具有图案的小区域。区域设置例如可以具有1mm 2-1cm 2的面积。这至少一个区域设置可以随实现安全的内容对象的不同而不同。这至少一个区域设置可以被多个个人消费品产品共用。这至少一个区域设置中的每个区域设置内的图案不变,而每个区域设置周围的布置可以变化。这使得不论实现安全的内容对象如何变化,机器学习模型都可以只学习区域设置和机器可读代码二者。应理解,区域设置的数量越多,机器学习模型的判断(伪造产品判断)越准确。 In some embodiments of the present disclosure, a personal consumer product product may have at least one locale corresponding to a security-enabling content object, which may be used to train a machine learning model. A locale here refers to a small area with a pattern. A region setting can have an area of 1 mm 2 -1 cm 2 , for example. The at least one locale can vary from one content object implementing security to another. The at least one locale can be shared by multiple consumer goods products. The pattern within each locale of the at least one locale does not change, while the arrangement around each locale may vary. This allows the machine learning model to learn only both the locale and the machine readable code, regardless of changes in the content objects implementing security. It should be understood that the greater the number of regional settings, the more accurate the machine learning model's judgment (fake product judgment) is.
硬件实现hardware implementation
图5是图示出根据本公开一些实施例的其中可应用本公开的一般硬件环境。FIG. 5 is a diagram illustrating a general hardware environment in which the present disclosure may be applied, according to some embodiments of the present disclosure.
参考图5,现在将描述作为其中可应用本公开的各方面的硬件设备的示例的计算设备500。计算设备500可以是被配置成执行处理和/或计算的任何机器,可以是但不限于工作站、服务器、台式计算机、膝上型计算机、平板计算机、个人数字助理、智能电话、便携式相机或其任意组合。上述服务器可以整体或至少部分地由计算设 备500或类似的设备或系统来实现。Referring to FIG. 5 , a computing device 500 will now be described as an example of a hardware device in which aspects of the present disclosure may be applied. Computing device 500 may be any machine configured to perform processing and/or calculations, and may be, but is not limited to, a workstation, server, desktop computer, laptop computer, tablet computer, personal digital assistant, smart phone, portable camera, or any combination. The above-mentioned server may be implemented in whole or at least in part by computing device 500 or similar devices or systems.
计算设备500可以包括能够经由一个或多个接口与总线502连接或者与总线502通信的元件。例如,计算设备500可以包括总线502、一个或多个处理器504、一个或多个输入设备506以及一个或多个输出设备508。一个或多个处理器504可以是任何类型的处理器,并且可以包括但不限于一个或多个通用处理器和/或一个或多个专用处理器(诸如专用处理芯片)。输入设备506可以是能够向计算设备输入信息的任何类型的设备,并且可以包括但不限于鼠标、键盘、触摸屏、麦克风和/或遥控器。输出设备508可以是能够呈现信息的任何类型的设备,并且可以包括但不限于显示器、扬声器、视频/音频输出终端和/或打印机。计算设备500还可以包括非瞬态存储设备510或与非瞬态存储设备510连接,非瞬态存储设备510可以是非瞬态的并且可以实现数据存储库的任何存储设备,并且可以包括但不限于盘驱动器、光学存储设备、固态存储装置、软盘、柔性盘、硬盘、磁带或任何其它磁性介质、紧凑型盘或任何其它光学介质、ROM(只读存储器)、RAM(随机存取存储器)、高速缓存存储器和/或任何其它存储器芯片或盒带、和/或计算机可以从其读取数据、指令和/或代码的任何其它介质。非瞬态存储设备510可以是可从接口拆卸的。非暂态存储设备510可以具有用于实现上述方法和步骤的数据/指令/代码。计算设备500还可以包括通信设备512。通信设备512可以是能够与外部装置和/或与网络通信的任何类型的设备或系统,并且可以包括但不限于调制解调器、网络卡、红外通信设备、无线通信装备和/或诸如蓝牙 TM设备、802.11设备、WiFi设备、WiMax设备、蜂窝通信设施等的芯片组。 Computing device 500 may include elements capable of connecting to or communicating with bus 502 via one or more interfaces. For example, computing device 500 may include a bus 502 , one or more processors 504 , one or more input devices 506 , and one or more output devices 508 . Processor(s) 504 may be any type of processor and may include, but is not limited to, one or more general purpose processors and/or one or more special purpose processors (such as application specific processing chips). Input device 506 may be any type of device capable of entering information into a computing device, and may include, but is not limited to, a mouse, keyboard, touch screen, microphone, and/or remote control. Output devices 508 may be any type of device capable of presenting information, and may include, but are not limited to, displays, speakers, video/audio output terminals, and/or printers. Computing device 500 may also include or be connected to a non-transitory storage device 510, which may be any storage device that is non-transitory and that may implement a data repository, and may include, but is not limited to Disk drive, optical storage device, solid state storage device, floppy disk, flexible disk, hard disk, magnetic tape or any other magnetic medium, compact disk or any other optical medium, ROM (read only memory), RAM (random access memory), high speed Cache memory and/or any other memory chip or cartridge, and/or any other medium from which a computer can read data, instructions and/or code. The non-transitory storage device 510 may be removable from the interface. The non-transitory storage device 510 may have data/instructions/codes for implementing the above methods and steps. Computing device 500 may also include communication device 512 . The communication device 512 may be any type of device or system capable of communicating with external devices and/or with a network, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication equipment, and/or devices such as Bluetooth , 802.11 Chipsets for devices, WiFi devices, WiMax devices, cellular communications infrastructure, etc.
总线502可以包括但不限于工业标准体系架构(ISA)总线、微通道体系架构(MCA)总线、增强型ISA(EISA)总线、视频电子标准协会(VESA)本地总线和外围组件互连(PCI)总线。The bus 502 may include, but is not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, a Video Electronics Standards Association (VESA) local bus, and a Peripheral Component Interconnect (PCI) bus. bus.
计算设备500还可以包括工作存储器514,工作存储器514可以是可以存储对处理器504的工作有用的指令和/或数据的任何类型的工作存储器,并且可以包括但不限于随机存取存储器和/或只读存储器设备。 Computing device 500 may also include working memory 514, which may be any type of working memory that may store instructions and/or data useful for the operation of processor 504, and may include, but is not limited to, random access memory and/or Read-only memory device.
软件要素可以位于工作存储器514中,包括但不限于操作系统516、一个或多个应用程序518、驱动程序和/或其它数据和代码。用于执行上述方法和步骤的指令可以被包括在一个或多个应用程序518中。软件要素的指令的可执行代码或源代码可以存储在非瞬态计算机可读存储介质(诸如上述(一个或多个)存储设备510)中, 并且可以在可能编译和/或安装的情况下被读入到工作存储器514中。软件要素的指令的可执行代码或源代码也可以从远程位置下载。Software elements may be located in working memory 514 including, but not limited to, operating system 516, one or more application programs 518, drivers, and/or other data and code. Instructions for performing the methods and steps described above may be included in one or more application programs 518 . The executable code or source code of the instructions of the software elements may be stored in a non-transitory computer-readable storage medium (such as the above-mentioned storage device(s) 510), and may be compiled and/or installed It is read into the working memory 514. Executable or source code for instructions of a software element may also be downloaded from a remote location.
从上述实施例中,本领域技术人员可以清楚地知晓,可以通过软件及必要的硬件来实现本公开,或者可以通过硬件、固件等来实现本公开。基于这种理解,可以部分地以软件形式来实现本公开的实施例。计算机软件可以存储在计算机的可读存储介质中,比如软盘、硬盘、光盘或闪存中。计算机软件包括使得计算机(例如个人计算机、服务站或网络终端)运行根据本公开的各个实施例的方法或其一部分的一系列指令。From the above embodiments, those skilled in the art can clearly understand that the present disclosure can be realized by software and necessary hardware, or can be realized by hardware, firmware and the like. Based on this understanding, the embodiments of the present disclosure may be partially implemented in the form of software. The computer software can be stored in a computer-readable storage medium, such as a floppy disk, hard disk, optical disk or flash memory. Computer software includes a series of instructions that cause a computer, such as a personal computer, kiosk or network terminal, to execute a method, or a part thereof, according to various embodiments of the present disclosure.
已经这样描述了本公开,清楚的是,本公开可以以许多种方式变化。这些变化不被视为背离了本公开的精神和范围,而是对于本领域技术人员而言显而易见的所有这种修改意欲被包括在以下权利要求的范围中。Having thus described the disclosure, it will be obvious that it may be varied in many ways. Such changes are not to be regarded as a departure from the spirit and scope of the present disclosure, but all such modifications apparent to those skilled in the art are intended to be included within the scope of the following claims.

Claims (15)

  1. 一种个人消费品产品,包括:A personal consumer product product comprising:
    机器可读代码,以及machine readable code, and
    靠近机器可读代码的实现安全的内容对象,A content object that implements security next to machine-readable code,
    其中,实现安全的内容对象是根据机器可读代码而确定的。Wherein, the content object for implementing security is determined according to the machine-readable code.
  2. 根据权利要求1所述的个人消费品产品,其中,实现安全的内容对象至少部分地在周向方向上并且靠近地围绕机器可读代码。The personal consumer product product of claim 1, wherein the security-enabling content object at least partially circumferentially and closely surrounds the machine-readable code.
  3. 根据权利要求2所述的个人消费品产品,其中,实现安全的内容对象至少围绕在周向方向上测得的与相对于机器可读代码的几何中心的π/2弧度对应的总长度。The personal consumer product product of claim 2, wherein the security-enabling content object surrounds at least an overall length measured in a circumferential direction corresponding to π/2 radians relative to the geometric center of the machine readable code.
  4. 根据权利要求2所述的个人消费品产品,其中,实现安全的内容对象围绕在周向方向上测得的与相对于机器可读代码的几何中心的2π弧度对应的总长度。The personal consumer product product of claim 2, wherein the security-enabling content object surrounds an overall length measured in a circumferential direction corresponding to 2π radians relative to the geometric center of the machine readable code.
  5. 根据权利要求2-4中任一项所述的个人消费品产品,其中,在接近机器可读代码的实现安全的内容对象的边缘处,实现安全的内容对象沿着周向方向每厘米具有1-30个变化。The personal consumer product product according to any one of claims 2-4, wherein the security-enabling content object has a thickness of 1- 30 variations.
  6. 根据权利要求2-4中任一项所述的个人消费品产品,其中,实现安全的内容对象的沿着垂直于周向方向的方向测得的宽度大于等于0.5mm并且小于等于10mm。A personal consumer product product according to any one of claims 2-4, wherein the security-enabling content object has a width, measured in a direction perpendicular to the circumferential direction, of greater than or equal to 0.5 mm and less than or equal to 10 mm.
  7. 根据权利要求2-4中任一项所述的个人消费品产品,其中,在接近机器可读代码的实现安全的内容对象的边缘与机器可读代码的边缘之间的、沿着垂直于周向方向的方向测得的距离大于等于0mm并且小于等于10mm。The personal consumer product product according to any one of claims 2-4, wherein the distance between the edge of the security-enabling content object proximate to the machine-readable code and the edge of the machine-readable code is along a The distance measured in the direction of the direction is greater than or equal to 0mm and less than or equal to 10mm.
  8. 根据权利要求1所述的个人消费品产品,其中,在实现安全的内容对象与机器可读代码之间的表面积的比率在5%-30%的范围内。The personal consumer product product of claim 1, wherein the ratio of the surface area between the security-enabling content object and the machine-readable code is in the range of 5%-30%.
  9. 根据权利要求1所述的个人消费品产品,其中,实现安全的内容对象具有10%-35%的墨水覆盖率。The personal consumer product product of claim 1, wherein the security-enabling content object has an ink coverage of 10%-35%.
  10. 根据权利要求1所述的个人消费品产品,其中,实现安全的内容对象由一个或多个颜色的墨水印刷,并且,所述一个或多个颜色中的至少一个颜色比机器可读代码的墨水的颜色浅。The personal consumer product product of claim 1 , wherein the security-enabling content object is printed with ink of one or more colors, and at least one of the one or more colors is lighter than the color of the ink of the machine readable code. Light color.
  11. 根据权利要求1所述的个人消费品产品,其中,在实现安全的内容对象的第一局部区域内的第一局部墨水覆盖率不同于在实现安全的内容对象的第二局部区域内的第二局部墨水覆盖率,第二局部区域与第一局部区域不同。The personal consumer product product of claim 1 , wherein the first partial ink coverage within the first partial area of the security-enabling content object is different from the second partial ink coverage within the second partial area of the security-enabling content object. Ink coverage, the second partial area differs from the first partial area.
  12. 根据权利要求1所述的个人消费品产品,其中,实现安全的内容对象包括以下项目中的至少一个:防复制图案、潜影设计、缩微文本、和安全加网。The personal consumer product product of claim 1, wherein the security-enabling content object includes at least one of the following: a copy protection pattern, a latent image design, microtext, and a security screen.
  13. 根据权利要求1所述的个人消费品产品,其中,实现安全的内容对象包括与个人消费品产品的名称相关联的缩微文本或缩微图形。The personal consumer product product of claim 1, wherein the security-enabling content object includes microtext or micrographics associated with a name of the personal consumer product product.
  14. 根据权利要求1所述的个人消费品产品,其中,实现安全的内容对象不占据对机器可读代码进行扫描而言必要的区域。The personal consumer product product of claim 1, wherein the security-enabling content object does not occupy an area necessary for the machine-readable code to be scanned.
  15. 根据权利要求1所述的个人消费品产品,其中,实现安全的内容对象是由ADOBE软件插件根据机器可读代码形成的。The personal consumer product product of claim 1, wherein the security-enabling content object is formed by an ADOBE software plug-in from machine-readable code.
PCT/CN2022/124675 2021-10-11 2022-10-11 Personal consumer product having secured content object WO2023061374A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111179862.1 2021-10-11
CN202111179862.1A CN115983866A (en) 2021-10-11 2021-10-11 Personal consumer product with security-enabled content objects

Publications (1)

Publication Number Publication Date
WO2023061374A1 true WO2023061374A1 (en) 2023-04-20

Family

ID=85966738

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/124675 WO2023061374A1 (en) 2021-10-11 2022-10-11 Personal consumer product having secured content object

Country Status (2)

Country Link
CN (1) CN115983866A (en)
WO (1) WO2023061374A1 (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120327450A1 (en) * 2006-07-19 2012-12-27 Advanced Track & Trace Methods and devices for securing and authenticating documents
WO2013145224A1 (en) * 2012-03-29 2013-10-03 A・Tコミュニケーションズ株式会社 2d code reading device, 2d code reading method, and program
US20140147046A1 (en) * 2011-06-21 2014-05-29 Jean-Pierre Massicot Method and device for authenticating a tag
JP2017041161A (en) * 2015-08-21 2017-02-23 株式会社デンソーウェーブ Information code generator
CN109196534A (en) * 2016-05-31 2019-01-11 爱克发有限公司 Authentication method for product packaging
US10710393B2 (en) 2016-05-10 2020-07-14 Agfa Nv Manufacturing of a security document
WO2020245290A1 (en) 2019-06-05 2020-12-10 Agfa Nv A method of digital halftoning
EA037240B1 (en) * 2020-08-13 2021-02-25 Закрытое Акционерное Общество "Голографическая Индустрия" Reference identification mark with a combined protection
FR3103931A1 (en) * 2019-11-28 2021-06-04 Advanced Track And Trace METHOD AND DEVICE FOR SECURING AN OBJECT AND PROCESS FOR AUTHENTICATION OF AN OBJECT
US11074592B2 (en) 2018-06-21 2021-07-27 The Procter & Gamble Company Method of determining authenticity of a consumer good

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120327450A1 (en) * 2006-07-19 2012-12-27 Advanced Track & Trace Methods and devices for securing and authenticating documents
US20140147046A1 (en) * 2011-06-21 2014-05-29 Jean-Pierre Massicot Method and device for authenticating a tag
WO2013145224A1 (en) * 2012-03-29 2013-10-03 A・Tコミュニケーションズ株式会社 2d code reading device, 2d code reading method, and program
JP2017041161A (en) * 2015-08-21 2017-02-23 株式会社デンソーウェーブ Information code generator
US10710393B2 (en) 2016-05-10 2020-07-14 Agfa Nv Manufacturing of a security document
CN109196534A (en) * 2016-05-31 2019-01-11 爱克发有限公司 Authentication method for product packaging
US11074592B2 (en) 2018-06-21 2021-07-27 The Procter & Gamble Company Method of determining authenticity of a consumer good
WO2020245290A1 (en) 2019-06-05 2020-12-10 Agfa Nv A method of digital halftoning
FR3103931A1 (en) * 2019-11-28 2021-06-04 Advanced Track And Trace METHOD AND DEVICE FOR SECURING AN OBJECT AND PROCESS FOR AUTHENTICATION OF AN OBJECT
EA037240B1 (en) * 2020-08-13 2021-02-25 Закрытое Акционерное Общество "Голографическая Индустрия" Reference identification mark with a combined protection

Also Published As

Publication number Publication date
CN115983866A (en) 2023-04-18

Similar Documents

Publication Publication Date Title
JP4898999B2 (en) Printed matter, detection method and detection device for the printed matter, and authentication method and authentication device
US20120050817A1 (en) Printing structure of medium surface on which dot pattern is formed by printing, printing method, and its reading method
JP2007505762A (en) Article authentication system and method
CN107206829A (en) The method for protecting invisible 2D bar codes and print image
CN104820854A (en) Combined anti-counterfeiting mark, and generation method and generation device of combined anti-counterfeiting mark
JP7197044B2 (en) Information recording media, media and booklets
EP3356995B1 (en) Method and system of forensic encryption
EP3219505B1 (en) Information recording object, reading device, and program
JP2005102264A (en) Method for embedding screen code capable of storing large amount of data on paper
US20110033089A1 (en) Apparatus for appraising the genuineness of personal identification documents
CN104992208A (en) Anti-counterfeiting method through comparison identification with encryption patterns by use of two-dimensional codes
WO2023061374A1 (en) Personal consumer product having secured content object
JP3917244B2 (en) Confidential information concealment card
JP7351108B2 (en) Information records, media and booklets
JP2005086829A (en) Printed material verification
CN105612736B (en) The encoded information in the graphic element of image
JP2013246685A (en) Information code, printing medium and issuing method
KR101727585B1 (en) A Document Having Printed Means Of Preventing From Forging/Manipulating
CN109313701B (en) Method, imaging device and system for generating a measure of the authenticity of an object
JP7276399B2 (en) duplicate restraint printed matter
JP2008035112A (en) Image display medium, composite image display data creation method and image generation system
JP3079156U (en) Forgery prevention form
JP6575213B2 (en) Information printed matter, reading method and authentication method
CN211237559U (en) Anti-counterfeit label
CN114331461A (en) Personal consumer product with counterfeit detection mark and authentication method and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22880311

Country of ref document: EP

Kind code of ref document: A1