Nothing Special   »   [go: up one dir, main page]

WO2020199393A1 - Anti-counterfeiting system and anti-counterfeiting method - Google Patents

Anti-counterfeiting system and anti-counterfeiting method Download PDF

Info

Publication number
WO2020199393A1
WO2020199393A1 PCT/CN2019/093585 CN2019093585W WO2020199393A1 WO 2020199393 A1 WO2020199393 A1 WO 2020199393A1 CN 2019093585 W CN2019093585 W CN 2019093585W WO 2020199393 A1 WO2020199393 A1 WO 2020199393A1
Authority
WO
WIPO (PCT)
Prior art keywords
counterfeiting
information
identification
area
authentication
Prior art date
Application number
PCT/CN2019/093585
Other languages
French (fr)
Chinese (zh)
Inventor
陈成楷
陈庆伟
缪小微
黄伟忠
Original Assignee
广州市宝绅科技应用有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州市宝绅科技应用有限公司 filed Critical 广州市宝绅科技应用有限公司
Publication of WO2020199393A1 publication Critical patent/WO2020199393A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Definitions

  • the invention relates to the technical field of anti-counterfeiting codes, in particular to an anti-counterfeiting system and an anti-counterfeiting method.
  • the inventor conceived that the authentication process of the anti-counterfeiting code is realized as the separation of the cloud and the device side. This can prevent the problem of being cracked at one end and causing the entire anti-counterfeiting code to become invalid during the process of anti-counterfeiting and identification. , There is no need to upgrade the identification program of the terminal, which helps to ensure the security of the anti-counterfeiting process, while reducing upgrade and maintenance costs.
  • an anti-counterfeiting system including: an identification module for obtaining identification information and anti-counterfeiting information from an anti-counterfeiting code set on a terminal device, and outputting the identification information and anti-counterfeiting information to the following anti-counterfeiting module;
  • the anti-counterfeiting module of the device is used to receive the identification information and the anti-counterfeiting information for authentication and generate the authentication result to output to the identification module.
  • the identification module the information of the anti-counterfeiting code can be initially identified and determined, and then the anti-counterfeiting module can be used for authentication. This double-end identification and authentication method can make the anti-counterfeiting code have a higher safety factor in the authentication process. Because the single end is cracked, the anti-counterfeiting effect of the entire anti-counterfeiting code is invalidated.
  • the identification module includes a first identification unit and a second identification unit.
  • the first identification unit is used to identify the anti-counterfeiting code set on the terminal device, and locate the anti-counterfeiting code through the error correction code that comes with the anti-counterfeiting code.
  • the effective identification area is used to obtain identification information; the second identification unit is used to obtain anti-counterfeiting information based on the identification information of the effective identification area, and output the identification information and anti-counterfeiting information of the effective identification area to the anti-counterfeiting module.
  • the information of the anti-counterfeiting code can be effectively obtained, which is different from the direct identification of the anti-counterfeiting code in the prior art, which can effectively improve the security of the anti-counterfeiting process.
  • the identification information includes an anti-counterfeiting area encoding method and an anti-counterfeiting area encoding version
  • the second identification module decodes according to the anti-counterfeiting area encoding method and the anti-counterfeiting area encoding version to obtain the anti-counterfeiting information.
  • the anti-counterfeiting area coding method and the anti-counterfeiting area code version it can assist the anti-counterfeiting module to decode the anti-counterfeiting area information and guide the decoding method of the anti-counterfeiting module.
  • the anti-counterfeiting module includes an authenticating unit and a verification unit.
  • the authenticating unit is configured to perform a decoding operation to obtain anti-counterfeiting data according to the acquired anti-counterfeiting information and the identification information of the effective identification area;
  • the verification unit is configured to verify the anti-counterfeiting data, Generate output of authentication result.
  • the processing of the verification unit can give the anti-counterfeiting process of the anti-counterfeiting code a secondary line of defense, which can overcome the terminal program being cracked when the anti-counterfeiting code is used in the prior art, or the source code of the decoding (encoding) program is leaked. This will lead to a large number of forgeries of anti-counterfeiting codes and affect information security.
  • the anti-counterfeiting module further includes: a statistical unit configured to count the current number of authentication times based on the authentication result, and generate an early warning information output when it is judged that the authentication of the anti-counterfeiting code reaches a preset authentication number threshold.
  • the unit can identify suspicious or forged anti-counterfeiting codes in time, which is beneficial to improve the security of information.
  • an anti-counterfeiting method including the following steps: receiving identification information and anti-counterfeiting information; performing authentication processing according to the received identification information and anti-counterfeiting information, and generating an output of the authentication result; wherein, identifying The information and anti-counterfeiting information are obtained from the anti-counterfeiting code set on the terminal device.
  • the identification module the information of the anti-counterfeiting code can be initially identified and determined, and then the anti-counterfeiting module can be used for authentication.
  • This double-end identification and authentication method can make the anti-counterfeiting code have a higher safety factor in the authentication process. Because the single end is cracked, the anti-counterfeiting effect of the entire anti-counterfeiting code is invalidated.
  • obtaining identification information and anti-counterfeiting information from the anti-counterfeiting code set on the terminal device includes the following steps: obtaining candidate area information of the anti-counterfeiting code, and locating the effective identification area of the anti-counterfeiting code through the error correction code that comes with the anti-counterfeiting code ;Acquire identification information based on the effective identification area; decode according to the identification information to obtain anti-counterfeiting information.
  • the setting of candidate identification areas and effective areas can increase the difficulty of cracking the anti-counterfeiting code to obtain identification information.
  • the identification information includes positioning information and color information
  • decoding according to the identification information to obtain the anti-counterfeiting information includes the following steps: determining the spatial arrangement of the anti-counterfeiting area and the identification area according to the positioning information; extracting the anti-counterfeiting area according to the color information information.
  • the anti-counterfeiting area coding method and the anti-counterfeiting area coding version it can assist the anti-counterfeiting module to decode the anti-counterfeiting area information, guide the decoding method of the anti-counterfeiting module, and realize the separation of identification information and anti-counterfeiting information, and then realize the separation of identification and anti-counterfeiting processing.
  • each terminal program corresponding to the analysis does not need to be upgraded simultaneously, and only the anti-counterfeiting codes can be upgraded, which is beneficial to reduce costs.
  • the identification information includes an anti-counterfeiting area coded version
  • generating an authentication result includes the following steps: decoding the anti-counterfeiting information according to the anti-counterfeiting area coded version to generate final data; verifying the validity of the final data to generate an authentication result output.
  • the method further includes the following steps: setting a threshold for the number of authentication times, setting a threshold for the number of authentication times, and counting the current number of authentication times according to the authentication result; judging the number of authentication times, when it is judged that the authentication of the anti-counterfeiting code reaches the number of authentication times The warning information output is generated when the threshold is reached.
  • setting a threshold for the number of authentication times setting a threshold for the number of authentication times, and counting the current number of authentication times according to the authentication result
  • judging the number of authentication times when it is judged that the authentication of the anti-counterfeiting code reaches the number of authentication times
  • the warning information output is generated when the threshold is reached.
  • Fig. 1 is a functional block diagram of an anti-counterfeiting system according to an embodiment of the present invention
  • FIG. 2 is a block diagram of the principle of an anti-counterfeiting system according to another embodiment of the present invention.
  • FIG. 3 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to an embodiment of the present invention
  • FIG. 4 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to another embodiment of the present invention.
  • FIG. 5 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to another embodiment of the present invention.
  • Fig. 6 is a flowchart of an anti-counterfeiting method according to an embodiment of the present invention.
  • Fig. 1 schematically shows a functional block diagram of an anti-counterfeiting system according to an embodiment of the present invention, as shown in Fig. 1,
  • the anti-counterfeiting system includes: an identification module 1 and an anti-counterfeiting module 2.
  • the identification module 1 is used to obtain identification information and anti-counterfeiting information from the anti-counterfeiting code set on the terminal device, and output to the following anti-counterfeiting module 2; the anti-counterfeiting module 2 is set in the remote device to receive the identification information and anti-counterfeiting information for authenticating And generate the authentication result and output it to the recognition module 1.
  • the identification module 1 can be set on terminal devices such as mobile phones and tablet computers. For example, when the identification module 1 is set, an application corresponding to the mobile phone system (such as Android, Iphone) is developed through the existing technology, and the mobile phone comes with Camera to scan the security code.
  • an application corresponding to the mobile phone system such as Android, Iphone
  • the anti-counterfeiting module 2 can be deployed on a remote server. Since the anti-counterfeiting module 2 is deployed on the server, it is much more difficult to break a server than a fixed program. Therefore, compared with the anti-counterfeiting code of the prior art The system has higher security.
  • the identification module 1 and the anti-counterfeiting module 2 are arranged at different ends and can communicate wirelessly.
  • the anti-counterfeiting code provided in this embodiment, as shown in FIG. 3, includes: an identification area 3 and an anti-counterfeiting area 4.
  • the identification area 3 is used to place identification information.
  • the anti-counterfeiting area 4 is used to place anti-counterfeiting information.
  • the identification area 3 and the anti-counterfeiting area 4 are arranged according to a preset spatial structure, that is, the anti-counterfeiting area 4 is arranged inside the identification area 3.
  • the spatial structure can also be implemented as setting a part of the anti-counterfeiting area 4 in the identification area 3.
  • the space structure can also be implemented as setting the anti-counterfeiting area 4 around the identification area 3, that is, the identification area is regarded as a single whole, and the anti-counterfeiting area is divided into four parts, respectively.
  • the identification area a part of the anti-counterfeiting area is set inside the identification area
  • the other part is set around the identification area, that is, the anti-counterfeiting area is divided into five areas, and the identification area is a single whole.
  • the space structure can also be implemented as setting the anti-counterfeiting area 4 around the identification area 3, that is, the identification area is regarded as a single whole, and the anti-counterfeiting area is divided into four parts, respectively.
  • the identification area is a part of the anti-counterfeiting area is set inside the identification area
  • the other part is
  • the spatial structure of the identification area is divided into non-overlapping identification blocks during construction, and identifiers are filled in corresponding positions of each identification block to form binary data; the binary data is sliced to generate information for identification.
  • each identification block is used to represent 1 bit of information. If the identifier filled in the identification block is black, it means 1, and when it is white, it means 0, and these identification blocks form binary data of a certain length. Afterwards, the binary data is fragmented (the specific implementation method can refer to the prior art implementation), which can be used to express a large amount of information.
  • the information used for identification includes first identification information, and the first identification information includes an encoding method, an encoding version, positioning information, and color information of the anti-counterfeiting area.
  • the first 4 bits of the binary data are used to indicate the encoding method of the anti-counterfeiting code
  • the 5th to 8th bits are used to indicate the encoding version of the anti-counterfeiting area.
  • the anti-counterfeiting area coding method and the anti-counterfeiting area coded version are used to assist the terminal or server that authenticates the anti-counterfeiting code to decode its anti-counterfeiting area information.
  • the positioning information is used to describe the relative position of the anti-counterfeiting area and the identification area, and the size of the anti-counterfeiting area (the number of pixels in the width and height of the anti-counterfeiting area).
  • Color information is used to describe the color system used in the anti-counterfeiting area, such as Black-White, YUV, RGB, HSV, etc.
  • the specific spatial relationship between the anti-counterfeiting area and the recognition area is also reflected in the mapping relationship between the anti-counterfeiting area and the recognition area through the positioning information, so that the anti-counterfeiting information can be extracted through the positioning information and color information, and when extracting the anti-counterfeiting information, pass
  • the color information in the identification information can obtain the image information of the anti-counterfeiting area corresponding to the identification area, that is, the encrypted anti-counterfeiting information, which effectively improves the security of the anti-counterfeiting code.
  • the information used for identification also includes second identification information.
  • the second identification information includes an information error correction code and an information verification code, which are used to identify and distinguish the identification area.
  • the identification area is divided into a candidate identification area and a valid identification. Area, the candidate identification area is configured to include the first identification information, and the effective identification area is configured to include the first identification information and the second identification information. In specific applications, the candidate identification area can be scanned and searched, and the second Identification information verification to distinguish and determine the effective identification area.
  • the process of determining the effective identification area through the candidate identification area is specifically realized as: searching for the candidate identification area information to determine, if the identification information of the candidate identification area can perform information code error correction by itself, and also pass its own information check code verification, Then the candidate identification area is used as the effective identification area, that is, the first identification information can be corrected and verified by the detected second identification information, which means that the area includes both the second identification information and the first identification information. That is to determine the area as a valid recognition area.
  • the identification of the candidate area can be achieved by setting the structure of the candidate area and performing scanning judgment on the structure.
  • the candidate area is implemented as including four candidate positioning points forming an approximate matrix.
  • the candidate anchor point is: if there are at most m other black points in a circle with a black point as the center and radius n, then the black point is a candidate anchor point, and the size of n is determined by the radius r of the black point ,
  • An exemplary n 3 ⁇ r, the value range of m can be diversified, usually 1 or 0.
  • the candidate candidate area is implemented as including three candidate positioning points forming an approximate right triangle, and the fourth point can be calculated through the three positioning points.
  • the calculation method can be implemented with reference to the prior art (exemplary). In QR Code, 3 " ⁇ " fonts are used as anchor points, and the position of the fourth point is calculated through these 3 " ⁇ " fonts).
  • the candidate area can be identified through the candidate positioning point, and the candidate area has no obvious recognition pattern.
  • QR Code has an obvious "back" character pattern
  • Maxi Code has an obvious bull's eye pattern
  • DataMatrix has an obvious pattern. The two straight lines make the security of anti-counterfeiting higher.
  • the identification module of the anti-counterfeiting system of this embodiment includes a first identification unit 101 and a second identification unit 102.
  • the first identification unit 101 is used to identify the anti-counterfeiting code set on the terminal device, including first obtaining one or more candidate identifications.
  • the effective identification area of the anti-counterfeiting code is located from the candidate identification area through the error correction code that comes with the anti-counterfeiting code (that is, the second identification information in the anti-counterfeiting code is used for error correction and verification, so as to perform the obtained candidate identification area Distinguish to determine the effective identification area), and obtain identification information from the effective identification area after the effective identification area is determined (that is, read the first identification information and the second identification information in the effective identification area to obtain the first identification information And the identification information of the second identification information).
  • the second identification unit 102 is used to obtain the anti-counterfeiting information based on the identification information of the effective identification area and the relationship between the identification information and the anti-counterfeiting area (see the description of the anti-counterfeiting code section above), realize the extraction of anti-counterfeiting information, and effectively identify the identification information of the area And the anti-counterfeiting information is output to the anti-counterfeiting module 2.
  • the second identification unit 102 extracts the anti-counterfeiting information according to the positioning information and the color information in the identification information of the anti-counterfeiting code, thereby achieving the acquisition of the anti-counterfeiting information based on the identification information.
  • Obtaining anti-counterfeiting information through the positioning information and color information in the identification information can be specifically realized as: obtaining the spatial arrangement structure of the anti-counterfeiting area and the identification area through the positioning information.
  • the exemplary anti-counterfeiting area is inside the identification area, that is, the anti-counterfeiting information is in the identification information.
  • the inside of the anti-counterfeiting area then through the mapping relationship between the color information in the identification information and the anti-counterfeiting area, the anti-counterfeiting area is obtained using color information, and then the anti-counterfeiting area is extracted according to the determined color information.
  • the color information of the anti-counterfeiting area is White- Black
  • the color information includes black and white color blocks. If a color block in the anti-counterfeiting area is black, it is represented by 1, and if a certain color block is white, it is represented by 0, thereby obtaining binary anti-counterfeiting information.
  • the anti-counterfeiting module 2 includes an authenticating unit 201 and a verification unit 202.
  • the authenticating unit 201 is used to perform a decoding operation to obtain anti-counterfeiting data according to the obtained anti-counterfeiting information and the identification information of the effective identification area, which is specifically implemented as follows: according to the code in the identification information
  • the version information auxiliary anti-counterfeiting module 2 decodes the anti-counterfeiting information, that is, through the anti-counterfeiting area coding method and the anti-counterfeiting area code version.
  • the decoding rules and methods have been reflected in the anti-counterfeiting area coding method and the anti-counterfeiting area code version in the identification information.
  • the encoding method and encoding version information can be decoded according to the agreed protocol, and the anti-counterfeiting data can be obtained after decoding.
  • the encoding method is expandable. Specifically, when writing the encoding method of the anti-counterfeiting code, multiple encoding methods will be written at the same time. After the current encoding method has a problem, it will be written into other encoding methods. Replacement, exemplarily, for the anti-counterfeiting code of version 2019-4-3, three encoding methods are provided when writing (the codes of these three encoding methods are 0, 1, 2).
  • a new encoding method code 3 will be added, and the old encoding method is no longer used, and the new encoding method 3 is used for the newly generated anti-counterfeiting code through this encoding method.
  • a new encoding method is added to generate new encoding version information, and according to the new The encoding version information generates a new anti-counterfeiting code, and the old insecure encoding method is no longer used.
  • the verification unit 202 is used for verifying the anti-counterfeiting data, generating an output of the authentication result, and then returning the result to the identification module 1, wherein the authentication data is obtained after the authentication data is verified based on the selected verification method (which can be implemented with reference to the prior art)
  • the result of authentication is realized as a serial number.
  • an anti-counterfeit code that converts an image into digital information (such as White-Black color space, black is converted to 1, white is converted to 0), according to the code of the security code
  • the position of these digital information is rearranged, and the rearranged information is decrypted according to the encoded version information of the anti-counterfeiting area (for example, the existing DES algorithm, RSA algorithm), and finally a serial number is generated .
  • the serial number corresponding to the anti-counterfeiting code will be pre-stored in the anti-counterfeiting module (or pre-stored in the remote device where the anti-counterfeiting module is located, which can be accessed by the anti-counterfeiting module).
  • the anti-counterfeiting module If the anti-counterfeiting module is in the process of authenticating, it is judged according to the verification result The serial number is not detected, or the number of times the serial number has been authenticated has exceeded the threshold (the constraint conditions may not be set, and only the serial number is detected, which can be implemented flexibly according to requirements), then the output authentication result is Failure; if the anti-counterfeiting module detects the serial number during the authentication process, and the number of times the serial number has been authenticated does not exceed the threshold, the output authentication result is successful, and the output will be associated with the serial number The pictures, descriptions of the items, etc. (the serial number and its corresponding related information can be set and pre-stored when setting the coding rules corresponding to the anti-counterfeiting information).
  • the anti-counterfeiting module further includes a counting unit 203, which is used to count the current times of authentication based on the authentication result, and make a judgment every time the identification module initiates an authentication request to the anti-counterfeiting module. After each authentication is successful, the anti-counterfeiting module 2 will record the authentication times of the serial number. When it is judged that the authentication of the anti-counterfeiting code reaches the preset authentication times threshold, the warning information output is generated, and the warning information can be realized as specific text or graphic information to indicate that the code may be forged.
  • the security factor of the anti-counterfeiting process of the anti-counterfeiting code can be effectively improved, and the difficulty of being cracked is increased by the identification and anti-counterfeiting modules provided at both ends.
  • FIG. 6 schematically shows a flow chart of an anti-counterfeiting method according to an embodiment of the present invention. As shown in FIG. 6, this embodiment includes the following steps:
  • Step S601 receiving identification information and anti-counterfeiting information.
  • the identification information and anti-counterfeiting information are obtained from the anti-counterfeiting code set on the terminal device.
  • the specific acquisition method first obtain one or more candidate identification areas, and locate the effective identification area of the anti-counterfeiting code from the candidate identification area through the error correction code that comes with the anti-counterfeiting code (that is, correcting by the second identification information in the anti-counterfeiting code) Wrong sum check, so as to distinguish the obtained candidate identification areas to determine the effective identification area), and after the effective identification area is determined, the identification information is obtained from the effective identification area (that is, the first identification information in the effective identification area is read And second identification information to obtain identification information including the first identification information and the second identification information).
  • the second identification unit 102 is used to obtain anti-counterfeiting information based on the identification information of the effective identification area, according to the relationship between the identification information and the anti-counterfeiting area (see the description of the anti-counterfeiting code section above), and output the identification information and anti-counterfeiting information of the effective identification area to the anti-counterfeiting information Module 2.
  • the second identification module 102 decodes the anti-counterfeiting area encoding method and the anti-counterfeiting area code version of the anti-counterfeiting code to obtain the anti-counterfeiting information.
  • Step S602 Perform authentication processing according to the received identification information and anti-counterfeiting information, and generate an authentication result output.
  • the specific authentication processing includes: the authentication result obtained after verifying the authentication data based on the selected authentication method (which can be implemented with reference to the prior art) is realized as a serial number, if the authentication is performed in the anti-counterfeiting module If the serial number is not detected, or the number of times the serial number has been authenticated has exceeded the threshold (the constraint condition may not be set, and only the serial number is detected, which can be implemented flexibly according to requirements), then the output authentication The result is a failure; if the anti-counterfeiting module detects the serial number during the authentication process, and the number of times the serial number has been authenticated does not exceed the threshold, the output authentication result is successful, and the serial number will be output
  • the picture and description of the item associated with the number (the serial number and its corresponding associated information can be set and pre-stored when setting the coding rule corresponding to the anti-counterfe
  • the method further includes the following steps: setting a threshold for the number of times of authentication, and counting the current number of times of authentication based on the results of authentication, each time the identification module initiates an authentication request to the anti-counterfeiting module, each time after the authentication is successful ,
  • the anti-counterfeiting module 2 will record the identification times of the serial number. The number of times of forgery is judged, and when it is judged that the authentication of the anti-counterfeiting code reaches the threshold of the number of times of authentication, an early warning information output is generated.
  • the early warning information can be realized as specific text or graphic information to indicate that the code may be forged.
  • the anti-counterfeiting method can identify and authenticate the counterfeit at both ends, so that the security factor of the anti-counterfeiting code in the authentication process is higher, and the anti-counterfeiting effect of the entire anti-counterfeiting code will not be invalidated because the single-end is cracked.
  • the anti-counterfeiting code includes both identification information and anti-counterfeiting information
  • the identification of the identification information is realized through one end (which can be the identification module set in the terminal device), and the authentication of the anti-counterfeiting information is through the other end (which can be It is implemented by setting up the authentication module on the remote device (such as the cloud server). Therefore, when the anti-counterfeiting program is upgraded, only the cloud server needs to be upgraded. There is no need to upgrade various terminal devices or devices with anti-counterfeiting codes. The upgrade is more convenient and feasible.

Landscapes

  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

An anti-counterfeiting system, comprising: an identification module (1), used for obtaining identification information and anti-counterfeiting information from an anti-counterfeiting code provided on a terminal device, and outputting the identification information and the anti-counterfeiting information to an anti-counterfeiting module (2); and the anti-counterfeiting module (2) provided on a remote device, used for receiving the identification information and the anti-counterfeiting information for authentication, generating the authentication result, and outputting the authentication result to the identification module (1). Also disclosed is an anti-counterfeiting method. According to the method and system, the problem that the anti-counterfeiting code is counterfeited by a large number due to the fact that a terminal program is cracked or a source code is leaked, thereby losing an anti-counterfeiting function can be solved.

Description

一种防伪系统及防伪方法Anti-counterfeiting system and anti-counterfeiting method 技术领域Technical field
本发明涉及防伪码技术领域,特别是一种防伪系统及防伪方法。The invention relates to the technical field of anti-counterfeiting codes, in particular to an anti-counterfeiting system and an anti-counterfeiting method.
背景技术Background technique
市面上现有的图形化的防伪码,往往是在终端程序上识别图形,解析出防伪数据,然后将防伪数据发送到云端服务器进行鉴伪。但是,此类防伪码在使用时,往往会出现以下问题:The existing graphical anti-counterfeiting codes on the market often identify the graphics on the terminal program, analyze the anti-counterfeiting data, and then send the anti-counterfeiting data to the cloud server for authentication. However, when such anti-counterfeiting codes are used, the following problems often occur:
1、在防伪码由于需求进行升级时,其对应解析的每个终端程序都需要同步升级,因而代价高昂。1. When the anti-counterfeiting code is upgraded due to demand, each terminal program corresponding to the analysis needs to be upgraded simultaneously, which is costly.
2、在防伪码使用时存在因终端程序被破解,或解码(编码)程序源码泄漏的问题,从而会导致防伪码被大量伪造,影响信息安全。2. When the anti-counterfeiting code is used, there is a problem that the terminal program is cracked or the source code of the decoding (encoding) program is leaked, which will lead to a large number of forgeries of the anti-counterfeiting code and affect information security.
发明内容Summary of the invention
为了解决上述问题,发明人构思将防伪码的鉴别过程实现为云端和设备端分离,这样可以在防伪和识别的过程中可以防止在一端被破解而导致整个防伪码失效的问题,并且在升级过程中,不需要对终端的识别程序进行升级,有利于保证防伪过程的安全性,同时降低升级和维护成本。In order to solve the above-mentioned problems, the inventor conceived that the authentication process of the anti-counterfeiting code is realized as the separation of the cloud and the device side. This can prevent the problem of being cracked at one end and causing the entire anti-counterfeiting code to become invalid during the process of anti-counterfeiting and identification. , There is no need to upgrade the identification program of the terminal, which helps to ensure the security of the anti-counterfeiting process, while reducing upgrade and maintenance costs.
根据本发明的一个方面,提供了一种防伪系统,包括:识别模块,用于从设置于终端设备上的防伪码中获取识别信息和防伪信息,输出至下述防伪模块;和设置于远端设备的防伪模块,用于接收识别信息和防伪信息进行鉴伪并生成鉴伪结果输出至识别模块。根据识别模块可以对防伪码的信息进行初步的识别和确定,再根据防伪模块进行鉴伪,这种双端进行识别和鉴伪的方式可以使防伪码在鉴别过程的安全系数更高,不会因为单端被破解就使整个防伪码的防伪效果失效。According to one aspect of the present invention, there is provided an anti-counterfeiting system, including: an identification module for obtaining identification information and anti-counterfeiting information from an anti-counterfeiting code set on a terminal device, and outputting the identification information and anti-counterfeiting information to the following anti-counterfeiting module; The anti-counterfeiting module of the device is used to receive the identification information and the anti-counterfeiting information for authentication and generate the authentication result to output to the identification module. According to the identification module, the information of the anti-counterfeiting code can be initially identified and determined, and then the anti-counterfeiting module can be used for authentication. This double-end identification and authentication method can make the anti-counterfeiting code have a higher safety factor in the authentication process. Because the single end is cracked, the anti-counterfeiting effect of the entire anti-counterfeiting code is invalidated.
在一些实施方式中,识别模块包括第一识别单元和第二识别单元,第一识别单元用于对设置于终端设备上的防伪码进行识别,通过防伪码自带的纠错码定位防伪码的有效识别区域,获取识别信息;第二识别单元用于基于有效识别区域的识别信息,获取防伪信息,并将有效识别区域的识别信息和防伪信息输出至防伪模块。根据第一识别单元和第二识别单元对防伪码进行的处理可以有效的获取防伪码的信息,区别于现有技术直接对防伪码进行识别,可以有效的提高防伪过程的安全性。In some embodiments, the identification module includes a first identification unit and a second identification unit. The first identification unit is used to identify the anti-counterfeiting code set on the terminal device, and locate the anti-counterfeiting code through the error correction code that comes with the anti-counterfeiting code. The effective identification area is used to obtain identification information; the second identification unit is used to obtain anti-counterfeiting information based on the identification information of the effective identification area, and output the identification information and anti-counterfeiting information of the effective identification area to the anti-counterfeiting module. According to the processing of the anti-counterfeiting code by the first identification unit and the second identification unit, the information of the anti-counterfeiting code can be effectively obtained, which is different from the direct identification of the anti-counterfeiting code in the prior art, which can effectively improve the security of the anti-counterfeiting process.
在一些实施方式中,识别信息包括防伪区域编码方式和防伪区域编码版本, 第二识别模块根据所述防伪区域编码方式和防伪区域编码版本进行解码,获取防伪信息。根据防伪区域编码方式和防伪区域编码版本可以辅助防伪模块对防伪区域信息进行解码,指导防伪模块的解码方式,并且对于一些防伪码由于需求进行升级时,其对应解析的每个终端程序不需要同步升级,仅对防伪码进行升级即可,有利于降低成本。In some embodiments, the identification information includes an anti-counterfeiting area encoding method and an anti-counterfeiting area encoding version, and the second identification module decodes according to the anti-counterfeiting area encoding method and the anti-counterfeiting area encoding version to obtain the anti-counterfeiting information. According to the anti-counterfeiting area coding method and the anti-counterfeiting area code version, it can assist the anti-counterfeiting module to decode the anti-counterfeiting area information and guide the decoding method of the anti-counterfeiting module. When some anti-counterfeiting codes are upgraded due to demand, each terminal program corresponding to the analysis does not need to be synchronized Upgrade, only need to upgrade the anti-counterfeiting code, which will help reduce costs.
在一些实施方式中,防伪模块包括鉴伪单元和验证单元,鉴伪单元用于根据获取的防伪信息和有效识别区域的识别信息进行解码操作获取防伪数据;验证单元用于对防伪数据进行验证,生成鉴伪结果输出。在鉴伪单元的基础上又通过验证单元的处理可以给予防伪码的防伪过程二次防线,可以克服现有技术中在防伪码使用时存在因终端程序被破解,或解码(编码)程序源码泄漏的问题,从而会导致防伪码被大量伪造,影响信息安全的问题。In some embodiments, the anti-counterfeiting module includes an authenticating unit and a verification unit. The authenticating unit is configured to perform a decoding operation to obtain anti-counterfeiting data according to the acquired anti-counterfeiting information and the identification information of the effective identification area; the verification unit is configured to verify the anti-counterfeiting data, Generate output of authentication result. On the basis of the authentication unit, the processing of the verification unit can give the anti-counterfeiting process of the anti-counterfeiting code a secondary line of defense, which can overcome the terminal program being cracked when the anti-counterfeiting code is used in the prior art, or the source code of the decoding (encoding) program is leaked. This will lead to a large number of forgeries of anti-counterfeiting codes and affect information security.
在一些实施方式中,防伪模块还包括:统计单元,用于根据鉴伪结果统计当前的鉴伪次数进行判断,当判断防伪码的鉴别达到预设的鉴别次数阈值时生成预警信息输出。通过该单元可以及时的鉴定出可疑或伪造的防伪码,有利于提高信息的安全性。In some embodiments, the anti-counterfeiting module further includes: a statistical unit configured to count the current number of authentication times based on the authentication result, and generate an early warning information output when it is judged that the authentication of the anti-counterfeiting code reaches a preset authentication number threshold. The unit can identify suspicious or forged anti-counterfeiting codes in time, which is beneficial to improve the security of information.
根据本发明的另一个方面,提供了一种防伪方法,包括如下步骤:接收识别信息和防伪信息;根据接收到的识别信息和防伪信息进行鉴伪处理,并生成鉴伪结果输出;其中,识别信息和防伪信息为从设置于终端设备上的防伪码中获取。根据识别模块可以对防伪码的信息进行初步的识别和确定,再根据防伪模块进行鉴伪,这种双端进行识别和鉴伪的方式可以使防伪码在鉴别过程的安全系数更高,不会因为单端被破解就使整个防伪码的防伪效果失效。According to another aspect of the present invention, there is provided an anti-counterfeiting method, including the following steps: receiving identification information and anti-counterfeiting information; performing authentication processing according to the received identification information and anti-counterfeiting information, and generating an output of the authentication result; wherein, identifying The information and anti-counterfeiting information are obtained from the anti-counterfeiting code set on the terminal device. According to the identification module, the information of the anti-counterfeiting code can be initially identified and determined, and then the anti-counterfeiting module can be used for authentication. This double-end identification and authentication method can make the anti-counterfeiting code have a higher safety factor in the authentication process. Because the single end is cracked, the anti-counterfeiting effect of the entire anti-counterfeiting code is invalidated.
在一些实施方式中,从设置于终端设备上的防伪码中获取识别信息和防伪信息包括如下步骤:获取防伪码的候选区域信息,通过防伪码自带的纠错码定位防伪码的有效识别区域;基于有效识别区域,获取识别信息;根据识别信息进行解码获取防伪信息。通过候选识别区域和有效区域的设置可以提高破解防伪码获取识别信息的难度。In some embodiments, obtaining identification information and anti-counterfeiting information from the anti-counterfeiting code set on the terminal device includes the following steps: obtaining candidate area information of the anti-counterfeiting code, and locating the effective identification area of the anti-counterfeiting code through the error correction code that comes with the anti-counterfeiting code ;Acquire identification information based on the effective identification area; decode according to the identification information to obtain anti-counterfeiting information. The setting of candidate identification areas and effective areas can increase the difficulty of cracking the anti-counterfeiting code to obtain identification information.
在一些实施方式中,识别信息包括定位信息和颜色信息,根据识别信息进行解码获取防伪信息包括如下步骤:根据定位信息确定防伪区域与识别区域的空间排布结构;根据颜色信息提取防伪区域的防伪信息。根据防伪区域编码方式和防伪区域编码版本可以辅助防伪模块对防伪区域信息进行解码,指导防伪模块的解码方式,并且能够实现识别信息与防伪信息的分离,进而实现识别和防伪处理的分离,这样对于一些防伪码由于需求进行升级时,其对应解析的每个终端程序不需要同步升级,仅对防伪码进行升级即可,有利于降低成本。In some embodiments, the identification information includes positioning information and color information, and decoding according to the identification information to obtain the anti-counterfeiting information includes the following steps: determining the spatial arrangement of the anti-counterfeiting area and the identification area according to the positioning information; extracting the anti-counterfeiting area according to the color information information. According to the anti-counterfeiting area coding method and the anti-counterfeiting area coding version, it can assist the anti-counterfeiting module to decode the anti-counterfeiting area information, guide the decoding method of the anti-counterfeiting module, and realize the separation of identification information and anti-counterfeiting information, and then realize the separation of identification and anti-counterfeiting processing. When some anti-counterfeiting codes are upgraded due to demand, each terminal program corresponding to the analysis does not need to be upgraded simultaneously, and only the anti-counterfeiting codes can be upgraded, which is beneficial to reduce costs.
在一些实施方式中,识别信息包括防伪区域编码版本,生成鉴伪结果包括如下步骤:根据防伪区域编码版本对所述防伪信息进行解码生成最终数据;验 证最终数据的有效性生成鉴伪结果输出。通过该解密过程可以有效的保护信息的安全性。In some embodiments, the identification information includes an anti-counterfeiting area coded version, and generating an authentication result includes the following steps: decoding the anti-counterfeiting information according to the anti-counterfeiting area coded version to generate final data; verifying the validity of the final data to generate an authentication result output. Through the decryption process, the security of the information can be effectively protected.
在一些实施方式中,还包括如下步骤:设定鉴别次数阈值,设定鉴别次数阈值,根据鉴伪结果统计当前的鉴伪次数;对鉴伪次数进行判断,当判断防伪码的鉴别达到鉴别次数阈值时生成预警信息输出。通过设定的阈值可以及时的鉴定出可疑或伪造的防伪码,有利于提高信息的安全性。In some embodiments, the method further includes the following steps: setting a threshold for the number of authentication times, setting a threshold for the number of authentication times, and counting the current number of authentication times according to the authentication result; judging the number of authentication times, when it is judged that the authentication of the anti-counterfeiting code reaches the number of authentication times The warning information output is generated when the threshold is reached. Through the set threshold, suspicious or forged anti-counterfeiting codes can be identified in time, which is beneficial to improve the security of information.
附图说明Description of the drawings
图1为本发明一实施方式的防伪系统原理框图;Fig. 1 is a functional block diagram of an anti-counterfeiting system according to an embodiment of the present invention;
图2为本发明又一实施方式的防伪系统原理框图;2 is a block diagram of the principle of an anti-counterfeiting system according to another embodiment of the present invention;
图3为本发明一实施方式的应用防伪系统的防伪码的结构框图;FIG. 3 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to an embodiment of the present invention;
图4为本发明又一实施方式的应用防伪系统的防伪码的结构框图;4 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to another embodiment of the present invention;
图5为本发明另一实施方式的应用防伪系统的防伪码的结构框图;FIG. 5 is a structural block diagram of an anti-counterfeiting code applying an anti-counterfeiting system according to another embodiment of the present invention;
图6为本发明一实施方式的防伪方法流程图。Fig. 6 is a flowchart of an anti-counterfeiting method according to an embodiment of the present invention.
具体实施方式detailed description
下面结合附图对本发明作进一步详细的说明。The present invention will be further described in detail below in conjunction with the drawings.
图1示意性地显示了根据本发明的一种实施方式的防伪系统原理框图,如图1所示,Fig. 1 schematically shows a functional block diagram of an anti-counterfeiting system according to an embodiment of the present invention, as shown in Fig. 1,
该防伪系统包括:识别模块1和防伪模块2。识别模块1用于从设置于终端设备上的防伪码中获取识别信息和防伪信息,输出至下述防伪模块2;防伪模块2设置于远端设备,用于接收识别信息和防伪信息进行鉴伪并生成鉴伪结果输出至识别模块1。对于识别模块1可以设置在手机、平板电脑等终端设备上,示例性地,在设置该识别模块1时,通过现有技术开发对应手机系统(比如Android,Iphone)的应用程序,通过手机自带的摄像头去扫描防伪码。对于防伪模块2可以部署于远端服务器上,由于该防伪模块2部署在服务器上,对于攻破一台服务器,难度远远高于一道固定的程序,所以相比于现有技术的防伪码的防伪系统有着更高的安全性。识别模块1和防伪模块2设置于不同的两端,并且可以进行无线通信。The anti-counterfeiting system includes: an identification module 1 and an anti-counterfeiting module 2. The identification module 1 is used to obtain identification information and anti-counterfeiting information from the anti-counterfeiting code set on the terminal device, and output to the following anti-counterfeiting module 2; the anti-counterfeiting module 2 is set in the remote device to receive the identification information and anti-counterfeiting information for authenticating And generate the authentication result and output it to the recognition module 1. The identification module 1 can be set on terminal devices such as mobile phones and tablet computers. For example, when the identification module 1 is set, an application corresponding to the mobile phone system (such as Android, Iphone) is developed through the existing technology, and the mobile phone comes with Camera to scan the security code. The anti-counterfeiting module 2 can be deployed on a remote server. Since the anti-counterfeiting module 2 is deployed on the server, it is much more difficult to break a server than a fixed program. Therefore, compared with the anti-counterfeiting code of the prior art The system has higher security. The identification module 1 and the anti-counterfeiting module 2 are arranged at different ends and can communicate wirelessly.
对于本实施例提供的防伪码,如图3所示,包括:识别区域3和防伪区域4。识别区域3用于放置识别信息。防伪区域4用于放置防伪信息。识别区域3与防伪区域4按预设的空间结构排布,即防伪区域4设置在识别区域3的内部。为了尽可能多的提高识别区域3和防伪区域4中蕴含的信息,在其它优选实施方式中,如图4所示,该空间结构还可以实现为将防伪区域4的一部分设置在识别区域3的内部,另一部分设置在识别区域3的四周,即将防伪区域的一部 分设置在识别区域的内部,另一部分设置在识别区域的四周,即将防伪区域分为五个区域,识别区域作为单独的一个整体,在识别区域的内部设置一个防伪区域,在识别区域的四周分别设置一个防伪区域,这样可以蕴含大量的信息。在其它优选实施方式中,如图5所示,该空间结构还可以实现为将防伪区域4设置在识别区域3的四周,即将识别区域作为单独的一个整体,防伪区域分为四部分,分别设置在识别区域的四周。The anti-counterfeiting code provided in this embodiment, as shown in FIG. 3, includes: an identification area 3 and an anti-counterfeiting area 4. The identification area 3 is used to place identification information. The anti-counterfeiting area 4 is used to place anti-counterfeiting information. The identification area 3 and the anti-counterfeiting area 4 are arranged according to a preset spatial structure, that is, the anti-counterfeiting area 4 is arranged inside the identification area 3. In order to improve the information contained in the identification area 3 and the anti-counterfeiting area 4 as much as possible, in other preferred embodiments, as shown in FIG. 4, the spatial structure can also be implemented as setting a part of the anti-counterfeiting area 4 in the identification area 3. Inside, the other part is set around the identification area 3, that is, a part of the anti-counterfeiting area is set inside the identification area, and the other part is set around the identification area, that is, the anti-counterfeiting area is divided into five areas, and the identification area is a single whole. Set up an anti-counterfeiting area inside the identification area, and set up an anti-counterfeiting area around the identification area, which can contain a lot of information. In other preferred embodiments, as shown in FIG. 5, the space structure can also be implemented as setting the anti-counterfeiting area 4 around the identification area 3, that is, the identification area is regarded as a single whole, and the anti-counterfeiting area is divided into four parts, respectively. Around the identification area.
其中,对于识别区域的空间结构在构建时被划分为不重合标识块,在各标识块对应的位置填入标识符组成二进制数据;将二进制数据进行分片操作生成用于识别的信息。示例性地,每个标识块用于表示1bit信息,若标识块填入的标示符是黑色时表示1,白色时表示0,将这些标识块构成一定长度的二进制数据。之后将该二进制数据进行分片(具体实现方式可以参照现有技术实现),这样可以用来表达大量信息。对于用于识别的信息包括第一识别信息,第一识别信息包括防伪区域的编码方式、编码版本、定位信息和颜色信息。示例性地,该二进制数据的前4个bits用来表示防伪码的编码方式,第5到8个bits用来表示防伪区域的编码版本。具体地,防伪区域编码方式和防伪区域编码版本用于辅助鉴别该防伪码的终端或服务端对其防伪区域信息进行解码。定位信息用于描述防伪区域与识别区域的相对位置,以及防伪区域的尺寸(防伪区域的宽度和高度的像素个数)。颜色信息用于描述防伪区域采用的颜色体系,例如Black-White、YUV、RGB、HSV等。对于防伪区域与识别区域具有特定的空间关系还体现在通过定位信息可以在防伪区域和识别区域建立映射关系,这样就可以通过定位信息和颜色信息来提取防伪信息,而且在提取防伪信息时,通过识别信息中的颜色信息可以获取该识别区域对应的防伪区域的图像信息,即加密的防伪信息,有效的提高了防伪码的安全性。示例性地,对于Black-White颜色体系,获取的图像数据只有大约600字节,再加上少量彩色信息数据跟边框数据,共不超过1kB。对于识别过程中,占用的网络宽带极低,可以有效的提高识别速度。用于识别的信息还包括第二识别信息,第二识别信息包括信息纠错码和信息效验码,用于标识和区分识别区域,示例性地,将识别区域区分为包括候选识别区域和有效识别区域,候选识别区域配置为其中包括有第一识别信息,有效识别区域配置为其中包括第一识别信息和第二识别信息,在具体应用中,可以通过扫描和查找候选识别区域,并通过第二识别信息的校验来区分和确定有效识别区域。对于通过候选识别区域确定有效识别区域的过程具体实现为:查找候选识别区域信息进行确定,若候选识别区域的识别信息能够自行进行信息码纠错,并且还通过自身的信息检验码的校验,则将该候选识别区域作为有效识别区域,即能通过检测到的第二识别信息对第一识别信息进行纠错和校验,即说明该区域同时包括有第二识别信息和第一识别信息,即将该区域确定为有 效识别区域。其中,对候选区域的识别可以是通过设置候选区域的结构和对该结构进行扫描判断实现,例如候选区域实现为包括有四个构成近似矩阵的候选定位点。该候选定位点为:若以一个黑点为圆心,半径为n的圆内,最多有m个其他黑点,则该黑点为候选定位点,n的大小由该黑点的半径r来确定,示例性的n=3×r,m的取值范围可以多样化,通常取1或者0。在其它实施方式中,该候选候选区域实现为包括有三个构成近似直角三角形的候选定位点,通过三个定位点可以计算得到第四个点,其中,计算方法可以参考现有技术实现(示例性地,在QR Code中,用3个“回”字型作为定位点,通过这3个“回”字型计算出第四个点的位置)。通过该候选定位点就可以识别候选区域,并且该候选区域没有明显的识别图案,例如现有技术中QR Code有明显的“回”字图形,Maxi Code有明显的牛眼图形,DataMatrix有明显的两条直线,使得防伪的安全性更高。Wherein, the spatial structure of the identification area is divided into non-overlapping identification blocks during construction, and identifiers are filled in corresponding positions of each identification block to form binary data; the binary data is sliced to generate information for identification. Exemplarily, each identification block is used to represent 1 bit of information. If the identifier filled in the identification block is black, it means 1, and when it is white, it means 0, and these identification blocks form binary data of a certain length. Afterwards, the binary data is fragmented (the specific implementation method can refer to the prior art implementation), which can be used to express a large amount of information. The information used for identification includes first identification information, and the first identification information includes an encoding method, an encoding version, positioning information, and color information of the anti-counterfeiting area. Exemplarily, the first 4 bits of the binary data are used to indicate the encoding method of the anti-counterfeiting code, and the 5th to 8th bits are used to indicate the encoding version of the anti-counterfeiting area. Specifically, the anti-counterfeiting area coding method and the anti-counterfeiting area coded version are used to assist the terminal or server that authenticates the anti-counterfeiting code to decode its anti-counterfeiting area information. The positioning information is used to describe the relative position of the anti-counterfeiting area and the identification area, and the size of the anti-counterfeiting area (the number of pixels in the width and height of the anti-counterfeiting area). Color information is used to describe the color system used in the anti-counterfeiting area, such as Black-White, YUV, RGB, HSV, etc. The specific spatial relationship between the anti-counterfeiting area and the recognition area is also reflected in the mapping relationship between the anti-counterfeiting area and the recognition area through the positioning information, so that the anti-counterfeiting information can be extracted through the positioning information and color information, and when extracting the anti-counterfeiting information, pass The color information in the identification information can obtain the image information of the anti-counterfeiting area corresponding to the identification area, that is, the encrypted anti-counterfeiting information, which effectively improves the security of the anti-counterfeiting code. Exemplarily, for the Black-White color system, the acquired image data is only about 600 bytes, plus a small amount of color information data and frame data, which does not exceed 1 kB in total. For the recognition process, the occupied network bandwidth is extremely low, which can effectively improve the recognition speed. The information used for identification also includes second identification information. The second identification information includes an information error correction code and an information verification code, which are used to identify and distinguish the identification area. Illustratively, the identification area is divided into a candidate identification area and a valid identification. Area, the candidate identification area is configured to include the first identification information, and the effective identification area is configured to include the first identification information and the second identification information. In specific applications, the candidate identification area can be scanned and searched, and the second Identification information verification to distinguish and determine the effective identification area. The process of determining the effective identification area through the candidate identification area is specifically realized as: searching for the candidate identification area information to determine, if the identification information of the candidate identification area can perform information code error correction by itself, and also pass its own information check code verification, Then the candidate identification area is used as the effective identification area, that is, the first identification information can be corrected and verified by the detected second identification information, which means that the area includes both the second identification information and the first identification information. That is to determine the area as a valid recognition area. Wherein, the identification of the candidate area can be achieved by setting the structure of the candidate area and performing scanning judgment on the structure. For example, the candidate area is implemented as including four candidate positioning points forming an approximate matrix. The candidate anchor point is: if there are at most m other black points in a circle with a black point as the center and radius n, then the black point is a candidate anchor point, and the size of n is determined by the radius r of the black point , An exemplary n=3×r, the value range of m can be diversified, usually 1 or 0. In other embodiments, the candidate candidate area is implemented as including three candidate positioning points forming an approximate right triangle, and the fourth point can be calculated through the three positioning points. The calculation method can be implemented with reference to the prior art (exemplary). In QR Code, 3 "回" fonts are used as anchor points, and the position of the fourth point is calculated through these 3 "回" fonts). The candidate area can be identified through the candidate positioning point, and the candidate area has no obvious recognition pattern. For example, in the prior art, QR Code has an obvious "back" character pattern, Maxi Code has an obvious bull's eye pattern, and DataMatrix has an obvious pattern. The two straight lines make the security of anti-counterfeiting higher.
本实施例的防伪系统的识别模块包括第一识别单元101和第二识别单元102,第一识别单元101用于对设置于终端设备上的防伪码进行识别,包括首先获取一个或多个候选识别区域,通过防伪码自带的纠错码从候选识别区域中定位防伪码的有效识别区域(即通过防伪码中的第二识别信息来进行纠错和校验,从而对获取的候选识别区域进行区分,以确定有效识别区域),并在确定了有效识别区域后从有效识别区域获取识别信息(即读取有效识别区域中的第一识别信息和第二识别信息,以得到包括第一识别信息和第二识别信息的识别信息)。第二识别单元102用于基于有效识别区域的识别信息,根据识别信息与防伪区域的关系(见上述防伪码部分的描述)获取防伪信息,实现防伪信息的提取,并将有效识别区域的识别信息和防伪信息输出至防伪模块2。第二识别单元102根据防伪码的识别信息中的定位信息和颜色信息来提取防伪信息,由此实现基于识别信息来获取防伪信息。通过识别信息中的定位信息和颜色信息获取防伪信息具体可以实现为:通过定位信息获取防伪区域与识别区域的空间排布结构,示例性地防伪区域在识别区域的内部,即防伪信息在识别信息的内部;再通过识别信息中颜色信息与防伪区域对应的映射关系,获取防伪区域采用颜色信息,之后对防伪区域按确定的颜色信息进行信息提取,示例性地,防伪区域的颜色信息为White-Black,该颜色信息包含有黑色和白色色块,若防伪区域中的某一个色块是黑色,则用1表示,若某个色块是白色,则用0表示,从而获取二进制的防伪信息。The identification module of the anti-counterfeiting system of this embodiment includes a first identification unit 101 and a second identification unit 102. The first identification unit 101 is used to identify the anti-counterfeiting code set on the terminal device, including first obtaining one or more candidate identifications. Area, the effective identification area of the anti-counterfeiting code is located from the candidate identification area through the error correction code that comes with the anti-counterfeiting code (that is, the second identification information in the anti-counterfeiting code is used for error correction and verification, so as to perform the obtained candidate identification area Distinguish to determine the effective identification area), and obtain identification information from the effective identification area after the effective identification area is determined (that is, read the first identification information and the second identification information in the effective identification area to obtain the first identification information And the identification information of the second identification information). The second identification unit 102 is used to obtain the anti-counterfeiting information based on the identification information of the effective identification area and the relationship between the identification information and the anti-counterfeiting area (see the description of the anti-counterfeiting code section above), realize the extraction of anti-counterfeiting information, and effectively identify the identification information of the area And the anti-counterfeiting information is output to the anti-counterfeiting module 2. The second identification unit 102 extracts the anti-counterfeiting information according to the positioning information and the color information in the identification information of the anti-counterfeiting code, thereby achieving the acquisition of the anti-counterfeiting information based on the identification information. Obtaining anti-counterfeiting information through the positioning information and color information in the identification information can be specifically realized as: obtaining the spatial arrangement structure of the anti-counterfeiting area and the identification area through the positioning information. The exemplary anti-counterfeiting area is inside the identification area, that is, the anti-counterfeiting information is in the identification information. The inside of the anti-counterfeiting area; then through the mapping relationship between the color information in the identification information and the anti-counterfeiting area, the anti-counterfeiting area is obtained using color information, and then the anti-counterfeiting area is extracted according to the determined color information. Illustratively, the color information of the anti-counterfeiting area is White- Black, the color information includes black and white color blocks. If a color block in the anti-counterfeiting area is black, it is represented by 1, and if a certain color block is white, it is represented by 0, thereby obtaining binary anti-counterfeiting information.
其中,防伪模块2包括鉴伪单元201和验证单元202,鉴伪单元201用于根据获取的防伪信息和有效识别区域的识别信息进行解码操作获取防伪数据,具体实现为:根据识别信息中的编码版本信息辅助防伪模块2对防伪信息进行解码,即通过防伪区域编码方式和防伪区域编码版本进行解码,解码规则和方式 已经在识别信息中的防伪区域编码方式和防伪区域编码版本中体现,基于该编码方式和编码版本信息按约定协议进行解码即可,解码后得到防伪数据。其中,编码方式是可扩充的,具体可以为在对防伪码的编码方式进行写入时,会同时写入多种编码方式,在当前的编码方式出现问题后,会写入其它的编码方式进行替换,示例性地,对于2019-4-3版的防伪码在写入时提供了3种编码方式(这三种编码方式的代号为0、1、2),在当前的编码方式0、1、2出现问题后,会再增加新的编码方式代号3,同时旧的编码方式不再使用,而通过这种编码方式新生成的防伪码就采用新的编码方式3。这样在判断某些编码方式已经被破解或代码泄漏(例如根据该编码方式被鉴定次数是否超过设定的鉴定阈值来预测),则增加新的编码方式生成新的编码版本信息,根据该新的编码版本信息生成新的防伪码,并且不再使用旧的不安全的编码方式。验证单元202用于对防伪数据进行验证,生成鉴伪结果输出,之后将其结果返还至识别模块1,其中,基于选用的验证方式(可参照现有技术实现)对鉴伪数据进行验证后得到的鉴伪结果实现为一个序列号,示例性地,对于将图像转为数字信息的防伪码(比如White-Black颜色空间,将黑色转为1,白色转为0),按该防伪码的编码方式提供的规则,对这些数字信息的位置进行重排,再根据防伪区域的编码版本信息,对重排后的信息进行解密(比如采用现有的DES算法、RSA算法),最终产生一个序列号。与防伪码对应的序列号会预存在防伪模块中(或预存在防伪模块所在的远端设备中,可以被防伪模块访问),若在防伪模块在进行鉴伪的过程中,根据校验结果判断没有检测到该序列号,或者该序列号的被鉴伪次数已经超过阈值(也可以不设置该约束条件,仅判断是否检测到序列号,可根据需求灵活实现),则输出的鉴伪结果是失败;若防伪模块在进行鉴伪的过程中,检测到了该序列号,且该序列号的被鉴伪次数不超过阈值,则输出的鉴伪结果是成功,并且还会输出与该序列号关联的物品的图片、物品介绍等(序列号及其对应关联信息的设置可以在设置与防伪信息对应的编码规则时设定好并预存)。Among them, the anti-counterfeiting module 2 includes an authenticating unit 201 and a verification unit 202. The authenticating unit 201 is used to perform a decoding operation to obtain anti-counterfeiting data according to the obtained anti-counterfeiting information and the identification information of the effective identification area, which is specifically implemented as follows: according to the code in the identification information The version information auxiliary anti-counterfeiting module 2 decodes the anti-counterfeiting information, that is, through the anti-counterfeiting area coding method and the anti-counterfeiting area code version. The decoding rules and methods have been reflected in the anti-counterfeiting area coding method and the anti-counterfeiting area code version in the identification information. The encoding method and encoding version information can be decoded according to the agreed protocol, and the anti-counterfeiting data can be obtained after decoding. Among them, the encoding method is expandable. Specifically, when writing the encoding method of the anti-counterfeiting code, multiple encoding methods will be written at the same time. After the current encoding method has a problem, it will be written into other encoding methods. Replacement, exemplarily, for the anti-counterfeiting code of version 2019-4-3, three encoding methods are provided when writing (the codes of these three encoding methods are 0, 1, 2). In the current encoding method 0, 1 , 2 After a problem occurs, a new encoding method code 3 will be added, and the old encoding method is no longer used, and the new encoding method 3 is used for the newly generated anti-counterfeiting code through this encoding method. In this way, when it is judged that some encoding methods have been cracked or code leaked (for example, prediction is based on whether the number of times the encoding method has been authenticated exceeds the set identification threshold), a new encoding method is added to generate new encoding version information, and according to the new The encoding version information generates a new anti-counterfeiting code, and the old insecure encoding method is no longer used. The verification unit 202 is used for verifying the anti-counterfeiting data, generating an output of the authentication result, and then returning the result to the identification module 1, wherein the authentication data is obtained after the authentication data is verified based on the selected verification method (which can be implemented with reference to the prior art) The result of authentication is realized as a serial number. For example, for an anti-counterfeit code that converts an image into digital information (such as White-Black color space, black is converted to 1, white is converted to 0), according to the code of the security code According to the rules provided by the method, the position of these digital information is rearranged, and the rearranged information is decrypted according to the encoded version information of the anti-counterfeiting area (for example, the existing DES algorithm, RSA algorithm), and finally a serial number is generated . The serial number corresponding to the anti-counterfeiting code will be pre-stored in the anti-counterfeiting module (or pre-stored in the remote device where the anti-counterfeiting module is located, which can be accessed by the anti-counterfeiting module). If the anti-counterfeiting module is in the process of authenticating, it is judged according to the verification result The serial number is not detected, or the number of times the serial number has been authenticated has exceeded the threshold (the constraint conditions may not be set, and only the serial number is detected, which can be implemented flexibly according to requirements), then the output authentication result is Failure; if the anti-counterfeiting module detects the serial number during the authentication process, and the number of times the serial number has been authenticated does not exceed the threshold, the output authentication result is successful, and the output will be associated with the serial number The pictures, descriptions of the items, etc. (the serial number and its corresponding related information can be set and pre-stored when setting the coding rules corresponding to the anti-counterfeiting information).
在优选实施方式中,如图2所示,防伪模块还包括统计单元203,该单元用于根据鉴伪结果统计当前的鉴伪次数进行判断,当每次识别模块向防伪模块发起鉴伪请求时,每次鉴伪成功后,防伪模块2都会对该序列号的鉴定次数进行记录。当判断防伪码的鉴别达到预设的鉴别次数阈值时生成预警信息输出,该预警信息可以实现为特定文本、图形信息,用以说明该编码有可能是伪造的。In a preferred embodiment, as shown in FIG. 2, the anti-counterfeiting module further includes a counting unit 203, which is used to count the current times of authentication based on the authentication result, and make a judgment every time the identification module initiates an authentication request to the anti-counterfeiting module. After each authentication is successful, the anti-counterfeiting module 2 will record the authentication times of the serial number. When it is judged that the authentication of the anti-counterfeiting code reaches the preset authentication times threshold, the warning information output is generated, and the warning information can be realized as specific text or graphic information to indicate that the code may be forged.
根据本实施例提供的防伪系统,可以有效的对防伪码的防伪过程的安全系数进行大幅度的提高,通过设置在两端的识别和防伪模块增加了被破解的难度。According to the anti-counterfeiting system provided in this embodiment, the security factor of the anti-counterfeiting process of the anti-counterfeiting code can be effectively improved, and the difficulty of being cracked is increased by the identification and anti-counterfeiting modules provided at both ends.
图6示意性地显示了根据本发明一实施方式的防伪方法流程图,如图6所示,本实施例包括如下步骤:FIG. 6 schematically shows a flow chart of an anti-counterfeiting method according to an embodiment of the present invention. As shown in FIG. 6, this embodiment includes the following steps:
步骤S601:接收识别信息和防伪信息。其中,识别信息和防伪信息为从设 置于终端设备上的防伪码中获取。具体的获取方式:首先获取一个或多个候选识别区域,通过防伪码自带的纠错码从候选识别区域中定位防伪码的有效识别区域(即通过防伪码中的第二识别信息来进行纠错和校验,从而对获取的候选识别区域进行区分,以确定有效识别区域),并在确定了有效识别区域后从有效识别区域获取识别信息(即读取有效识别区域中的第一识别信息和第二识别信息,以得到包括第一识别信息和第二识别信息的识别信息)。第二识别单元102用于基于有效识别区域的识别信息,根据识别信息与防伪区域的关系(见上述防伪码部分的描述)获取防伪信息,并将有效识别区域的识别信息和防伪信息输出至防伪模块2。第二识别模块102根据防伪码自带的防伪区域编码方式和防伪区域编码版本进行解码,获取防伪信息。Step S601: receiving identification information and anti-counterfeiting information. Among them, the identification information and anti-counterfeiting information are obtained from the anti-counterfeiting code set on the terminal device. The specific acquisition method: first obtain one or more candidate identification areas, and locate the effective identification area of the anti-counterfeiting code from the candidate identification area through the error correction code that comes with the anti-counterfeiting code (that is, correcting by the second identification information in the anti-counterfeiting code) Wrong sum check, so as to distinguish the obtained candidate identification areas to determine the effective identification area), and after the effective identification area is determined, the identification information is obtained from the effective identification area (that is, the first identification information in the effective identification area is read And second identification information to obtain identification information including the first identification information and the second identification information). The second identification unit 102 is used to obtain anti-counterfeiting information based on the identification information of the effective identification area, according to the relationship between the identification information and the anti-counterfeiting area (see the description of the anti-counterfeiting code section above), and output the identification information and anti-counterfeiting information of the effective identification area to the anti-counterfeiting information Module 2. The second identification module 102 decodes the anti-counterfeiting area encoding method and the anti-counterfeiting area code version of the anti-counterfeiting code to obtain the anti-counterfeiting information.
步骤S602:根据接收到的识别信息和防伪信息进行鉴伪处理,并生成鉴伪结果输出。其中,具体的鉴伪处理包括:基于选用的验证方式(可参照现有技术实现)对鉴伪数据进行验证后得到的鉴伪结果实现为一个序列号,若在防伪模块在进行鉴伪的过程中,没有检测到该序列号,或者该序列号的被鉴伪次数已经超过阈值(也可以不设置该约束条件,仅判断是否检测到序列号,可根据需求灵活实现),则输出的鉴伪结果是失败;若防伪模块在进行鉴伪的过程中,检测到了该序列号,且该序列号的被鉴伪次数不超过阈值,则输出的鉴伪结果是成功,并且还会输出与该序列号关联的物品的图片、物品介绍等(序列号及其对应关联信息的设置可以在设置与防伪信息对应的编码规则时设定好并预存)。之后将鉴伪结构输出至终端设备上。Step S602: Perform authentication processing according to the received identification information and anti-counterfeiting information, and generate an authentication result output. Among them, the specific authentication processing includes: the authentication result obtained after verifying the authentication data based on the selected authentication method (which can be implemented with reference to the prior art) is realized as a serial number, if the authentication is performed in the anti-counterfeiting module If the serial number is not detected, or the number of times the serial number has been authenticated has exceeded the threshold (the constraint condition may not be set, and only the serial number is detected, which can be implemented flexibly according to requirements), then the output authentication The result is a failure; if the anti-counterfeiting module detects the serial number during the authentication process, and the number of times the serial number has been authenticated does not exceed the threshold, the output authentication result is successful, and the serial number will be output The picture and description of the item associated with the number (the serial number and its corresponding associated information can be set and pre-stored when setting the coding rule corresponding to the anti-counterfeiting information). Then output the authentication structure to the terminal device.
在优选实施方式中,该方法还包括如下步骤:设定鉴别次数阈值,根据鉴伪结果统计当前的鉴伪次数,当每次识别模块向防伪模块发起鉴伪请求时,每次鉴伪成功后,防伪模块2都会对该序列号的鉴定次数进行记录。对鉴伪次数进行判断,当判断防伪码的鉴别达到鉴别次数阈值时生成预警信息输出,该预警信息可以实现为特定文本、图形信息,用以说明该编码有可能是伪造的。In a preferred embodiment, the method further includes the following steps: setting a threshold for the number of times of authentication, and counting the current number of times of authentication based on the results of authentication, each time the identification module initiates an authentication request to the anti-counterfeiting module, each time after the authentication is successful , The anti-counterfeiting module 2 will record the identification times of the serial number. The number of times of forgery is judged, and when it is judged that the authentication of the anti-counterfeiting code reaches the threshold of the number of times of authentication, an early warning information output is generated. The early warning information can be realized as specific text or graphic information to indicate that the code may be forged.
根据本实施例的防伪方法可以通过双端进行识别和鉴伪的方式,使防伪码在鉴别过程的安全系数更高,不会因为单端被破解就使整个防伪码的防伪效果失效。而且由于防伪码同时包括识别信息和防伪信息,对识别信息的识别是通过其中一端(可以是设置在终端设备的识别模块)来实现的,对防伪信息的鉴伪则是通过另一端(可以是设置在远端设备如云端服务器上的鉴伪模块)来实现的,因而当对防伪程序进行升级时,仅需进行云端服务器的升级即可,不需要升级各个终端设备或设置防伪码的设备,升级更加方便,可行性高。The anti-counterfeiting method according to the present embodiment can identify and authenticate the counterfeit at both ends, so that the security factor of the anti-counterfeiting code in the authentication process is higher, and the anti-counterfeiting effect of the entire anti-counterfeiting code will not be invalidated because the single-end is cracked. Moreover, since the anti-counterfeiting code includes both identification information and anti-counterfeiting information, the identification of the identification information is realized through one end (which can be the identification module set in the terminal device), and the authentication of the anti-counterfeiting information is through the other end (which can be It is implemented by setting up the authentication module on the remote device (such as the cloud server). Therefore, when the anti-counterfeiting program is upgraded, only the cloud server needs to be upgraded. There is no need to upgrade various terminal devices or devices with anti-counterfeiting codes. The upgrade is more convenient and feasible.
以上所述的仅是本发明的一些实施方式。对于本领域的普通技术人员来说,在不脱离本发明创造构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。What has been described above are only some embodiments of the present invention. For those of ordinary skill in the art, without departing from the inventive concept of the present invention, several modifications and improvements can be made, and these all fall within the protection scope of the present invention.

Claims (10)

  1. 一种防伪系统,其特征在于,包括:An anti-counterfeiting system is characterized by comprising:
    识别模块,用于从设置于终端设备上的防伪码中获取识别信息和防伪信息,输出至下述防伪模块;和The identification module is used to obtain identification information and anti-counterfeiting information from the anti-counterfeiting code set on the terminal equipment, and output to the following anti-counterfeiting module; and
    设置于远端设备的防伪模块,用于接收所述识别信息和防伪信息进行鉴伪并生成鉴伪结果输出至所述识别模块。The anti-counterfeiting module provided in the remote device is used to receive the identification information and the anti-counterfeiting information for authentication and generate an authentication result to output to the identification module.
  2. 根据权利1所述的防伪系统,其特征在于,所述识别模块包括第一识别单元和第二识别单元,The anti-counterfeiting system according to claim 1, wherein the identification module includes a first identification unit and a second identification unit,
    所述第一识别单元用于对设置于终端设备上的防伪码进行识别,通过所述防伪码自带的纠错码定位所述防伪码的有效识别区域,获取识别信息;The first identification unit is configured to identify the anti-counterfeiting code set on the terminal device, and locate the effective identification area of the anti-counterfeiting code through the error correction code carried by the anti-counterfeiting code to obtain identification information;
    所述第二识别单元用于基于所述有效识别区域的识别信息,获取防伪信息,并将有效识别区域的识别信息和防伪信息输出至防伪模块。The second identification unit is configured to obtain anti-counterfeiting information based on the identification information of the effective identification area, and output the identification information and anti-counterfeiting information of the effective identification area to the anti-counterfeiting module.
  3. 根据权利要求2所述的防伪系统,其特征在于,所述识别信息包括防伪区域编码方式和防伪区域编码版本,所述第二识别模块根据所述防伪区域编码方式和防伪区域编码版本进行解码,获取防伪信息。The anti-counterfeiting system according to claim 2, wherein the identification information includes an anti-counterfeiting area encoding method and an anti-counterfeiting area encoding version, and the second identification module decodes according to the anti-counterfeiting area encoding method and the anti-counterfeiting area encoding version, Obtain anti-counterfeiting information.
  4. 根据权利要求3所述的防伪系统,其特征在于,所述防伪模块包括鉴伪单元和验证单元,The anti-counterfeiting system according to claim 3, wherein the anti-counterfeiting module includes an authentication unit and a verification unit,
    所述鉴伪单元用于根据获取的防伪信息和有效识别区域的识别信息进行解码操作获取防伪数据;The authentication unit is configured to perform a decoding operation to obtain anti-counterfeiting data according to the obtained anti-counterfeiting information and the identification information of the effective identification area;
    所述验证单元用于对所述防伪数据进行验证,生成鉴伪结果输出。The verification unit is used to verify the anti-counterfeiting data, and generate a verification result output.
  5. 根据权利要求1-4任意一项所述的防伪系统,其特征在于,所述防伪模块还包括:The anti-counterfeiting system according to any one of claims 1-4, wherein the anti-counterfeiting module further comprises:
    统计单元,用于根据鉴伪结果统计对当前防伪码的鉴伪次数进行判断,当判断所述防伪码的鉴伪次数达到预设的鉴别次数阈值时生成预警信息输出。The statistical unit is used to determine the number of times of authentication of the current anti-counterfeit code according to the statistics of the authentication result, and generate an early warning information output when it is judged that the number of times of authentication of the anti-counterfeit code reaches a preset authentication times threshold.
  6. 一种防伪方法,其特征在于,包括如下步骤:An anti-counterfeiting method is characterized in that it comprises the following steps:
    接收识别信息和防伪信息;Receive identification information and anti-counterfeiting information;
    根据接收到的识别信息和防伪信息进行鉴伪处理,并生成鉴伪结果输出;Perform authentication processing according to the received identification information and anti-counterfeiting information, and generate authentication result output;
    其中,所述识别信息和防伪信息为从设置于终端设备上的防伪码中获取。Wherein, the identification information and the anti-counterfeiting information are obtained from the anti-counterfeiting code set on the terminal device.
  7. 根据权利要求6所述的方法,其特征在于,所述从设置于终端设备上的防伪码中获取识别信息和防伪信息包括如下步骤:The method according to claim 6, wherein said obtaining identification information and anti-counterfeiting information from an anti-counterfeiting code set on a terminal device comprises the following steps:
    获取防伪码的候选区域信息,通过所述防伪码自带的纠错码定位所述防伪码的有效识别区域;Acquiring the candidate area information of the anti-counterfeiting code, and locating the effective identification area of the anti-counterfeiting code through the error correction code carried by the anti-counterfeiting code;
    基于所述有效识别区域,获取识别信息;Obtaining identification information based on the effective identification area;
    根据所述识别信息进行解码获取防伪信息。Decoding according to the identification information to obtain anti-counterfeiting information.
  8. 根据权利要求7所述的方法,其特征在于,所述识别信息包括定位信息和颜色信息,所述根据所述识别信息进行解码获取防伪信息包括如下步骤:The method according to claim 7, wherein the identification information includes positioning information and color information, and the decoding and obtaining anti-counterfeiting information according to the identification information includes the following steps:
    根据所述定位信息确定所述防伪区域与所述识别区域的空间排布结构;Determining the spatial arrangement structure of the anti-counterfeiting area and the identification area according to the positioning information;
    根据所述颜色信息提取所述防伪区域的防伪信息。The anti-counterfeiting information of the anti-counterfeiting area is extracted according to the color information.
  9. 根据权利要求6所述的方法,其特征在于,所述识别信息包括防伪区域编码版本,所述生成鉴伪结果包括如下步骤:The method according to claim 6, wherein the identification information includes an anti-counterfeiting area coded version, and the generating the authentication result includes the following steps:
    根据所述防伪区域编码版本对所述防伪信息进行解码生成最终数据;Decoding the anti-counterfeiting information according to the code version of the anti-counterfeiting area to generate final data;
    验证所述最终数据的有效性生成鉴伪结果输出。The validity of the final data is verified to generate an authentication result output.
  10. 根据权利要求9所述的方法,其特征在于,还包括如下步骤:The method according to claim 9, characterized in that it further comprises the following steps:
    设定鉴别次数阈值,根据所述鉴伪结果统计当前防伪码的鉴伪次数;Set a threshold for the number of times of authentication, and count the number of times of authentication of the current anti-counterfeiting code according to the result of the authentication;
    对鉴伪次数进行判断,当判断对当前防伪码的鉴伪次数达到鉴别次数阈值时生成预警信息输出。The number of authentication times is judged, and an early warning information output is generated when it is judged that the number of authentication times of the current anti-counterfeiting code reaches the threshold of authentication times.
PCT/CN2019/093585 2019-04-04 2019-06-28 Anti-counterfeiting system and anti-counterfeiting method WO2020199393A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910272268.3 2019-04-04
CN201910272268.3A CN109978574A (en) 2019-04-04 2019-04-04 A kind of anti-counterfeiting system and method for anti-counterfeit

Publications (1)

Publication Number Publication Date
WO2020199393A1 true WO2020199393A1 (en) 2020-10-08

Family

ID=67083048

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/093585 WO2020199393A1 (en) 2019-04-04 2019-06-28 Anti-counterfeiting system and anti-counterfeiting method

Country Status (2)

Country Link
CN (1) CN109978574A (en)
WO (1) WO2020199393A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109978115B (en) * 2019-04-04 2020-06-09 广州市宝绅科技应用有限公司 Anti-counterfeiting code and construction method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246863A (en) * 2013-04-02 2013-08-14 包晗 Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes
CN103310344A (en) * 2012-09-10 2013-09-18 成都菲普迪斯科技有限公司 CCQR (Colorful Coded Quick Response) anti-counterfeiting method
US9076024B2 (en) * 2013-03-07 2015-07-07 Authentag, Llc Anti-counterfeiting system and method
CN106203573A (en) * 2016-07-26 2016-12-07 闫河 Antifalsification label and Antiforge system
CN108122020A (en) * 2017-12-08 2018-06-05 北京小米移动软件有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN108960387A (en) * 2018-07-12 2018-12-07 南京林业大学 A kind of anti-counterfeiting two dimensional code and its generation and recognition methods

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807285A (en) * 2010-04-09 2010-08-18 周锡卫 Method for interactive dynamic forgery prevention and verification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310344A (en) * 2012-09-10 2013-09-18 成都菲普迪斯科技有限公司 CCQR (Colorful Coded Quick Response) anti-counterfeiting method
US9076024B2 (en) * 2013-03-07 2015-07-07 Authentag, Llc Anti-counterfeiting system and method
CN103246863A (en) * 2013-04-02 2013-08-14 包晗 Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes
CN106203573A (en) * 2016-07-26 2016-12-07 闫河 Antifalsification label and Antiforge system
CN108122020A (en) * 2017-12-08 2018-06-05 北京小米移动软件有限公司 Two-dimensional code generation method and device and two-dimensional code identification method and device
CN108960387A (en) * 2018-07-12 2018-12-07 南京林业大学 A kind of anti-counterfeiting two dimensional code and its generation and recognition methods

Also Published As

Publication number Publication date
CN109978574A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
US11349666B2 (en) Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and ID validation methods
US11210510B2 (en) Storing anonymized identifiers instead of personally identifiable information
US9805296B2 (en) Method and apparatus for decoding or generating multi-layer color QR code, method for recommending setting parameters in generation of multi-layer QR code, and product comprising multi-layer color QR code
CN104834839B (en) A kind of code generating method, method for authenticating and associated terminal based on bar code
US20200074130A1 (en) Item identification
CN108491785B (en) Artificial intelligence image identification attack defense system
CN112307520B (en) Electronic seal adding and verifying method and system
CN106599964A (en) Two-dimensional code generation and verification method and device
CN104243474B (en) Electronic equipment authenticity verification method and device
Li et al. Authpaper: Protecting paper-based documents and credentials using authenticated 2D barcodes
CN113988242A (en) Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium
US9064138B2 (en) Method for detecting reorgination of barcodes
WO2020199393A1 (en) Anti-counterfeiting system and anti-counterfeiting method
CN104112201B (en) The method of sending and receiving and equipment of electronic bill data
CN116167807A (en) Bill anti-counterfeiting method and device, electronic equipment and storage medium
KR102515358B1 (en) System of generating identification code image inserted authentication judgment information and method of authenticating goods using identification code iamge
WO2020199394A1 (en) Anti-counterfeiting code and construction method therefor
Mantoro et al. Real-time printed document authentication using watermarked qr code
CN109840574B (en) Two-dimensional code information hiding method and device, electronic equipment and storage medium
CN113076528A (en) Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium
CN112418371A (en) Secure three-dimensional code for blockchains and methods of generating and decoding
CN117056877B (en) Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption
US12039385B2 (en) Dynamic machine readable code
CN109784454A (en) A kind of information concealing method based on two dimensional code, device and electronic equipment
CN110197246B (en) Self-anti-counterfeiting multi-dimensional bar code generation and verification method, device and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19922492

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19922492

Country of ref document: EP

Kind code of ref document: A1