WO2015035705A1 - Optical recognition method and mobile device - Google Patents

Optical recognition method and mobile device Download PDF

Info

Publication number
WO2015035705A1
WO2015035705A1 PCT/CN2013/086962 CN2013086962W WO2015035705A1 WO 2015035705 A1 WO2015035705 A1 WO 2015035705A1 CN 2013086962 W CN2013086962 W CN 2013086962W WO 2015035705 A1 WO2015035705 A1 WO 2015035705A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
scanning area
target scanning
mobile device
target
Prior art date
Application number
PCT/CN2013/086962
Other languages
French (fr)
Chinese (zh)
Inventor
林于翔
孙福军
Original Assignee
深圳市同盛绿色科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市同盛绿色科技有限公司 filed Critical 深圳市同盛绿色科技有限公司
Publication of WO2015035705A1 publication Critical patent/WO2015035705A1/en

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • G01N21/8851Scan or image signal processing specially adapted therefor, e.g. for scan signal adjustment, for detecting different kinds of defects, for compensating for structures, markings, edges
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • G01N21/8851Scan or image signal processing specially adapted therefor, e.g. for scan signal adjustment, for detecting different kinds of defects, for compensating for structures, markings, edges
    • G01N2021/8887Scan or image signal processing specially adapted therefor, e.g. for scan signal adjustment, for detecting different kinds of defects, for compensating for structures, markings, edges based on image processing techniques

Definitions

  • the present invention relates to the field of anti-counterfeiting technology, and in particular to an optical recognition method and a mobile device.
  • Anti-counterfeiting is an important proposition in the trading of goods.
  • it is usually necessary to first scan the anti-counterfeit label for anti-counterfeiting information.
  • it is a progressive scan line by line. Even if the scanned area is not the destination area, the scanning speed is slow, which increases the load of the scanning device.
  • the technical problem to be solved by the present invention is to provide an optical recognition method and a mobile device capable of quickly scanning and identifying an optical scanning area and reducing the load of the scanning device.
  • the present invention provides an optical recognition method comprising: locking the target scanning area according to a boundary feature of a target scanning area before performing optical recognition; and optically identifying the locked target scanning area.
  • the boundary feature is obtained by identifying a difference between a color of the target scanning area itself and a color outside the target scanning area.
  • the boundary feature is obtained by identifying a graphic or color defining a boundary of the target scanning area.
  • the step of locking the target scanning area according to the boundary feature of the target scanning area includes: determining, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement, and performing the boundary according to the target scanning area if the requirement is met. The step of feature locking the target scan area, otherwise the step of locking the target scan area according to the target scan area boundary feature is not performed.
  • the step of determining, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement includes: determining, at the current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm;
  • the error correction algorithm corrects the current scan angle to meet the requirements.
  • the step of optically recognizing the locked target scanning area includes optically recognizing and correcting the locked target scanning area if the current scanning angle satisfies the requirement.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, wherein the angle is an angle between the scanned light and the target scanning area plane.
  • the step of optically recognizing the locked target scanning area includes: if the locked target scanning area is deformed and the deformation is within a predetermined range, the optical recognition is performed by using an error correction algorithm
  • the target scanning area performs error correction and restoration.
  • the target scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
  • the present invention provides a mobile device, comprising: a locking module, configured to lock the target scanning area according to a boundary feature of a target scanning area before performing optical recognition; and an optical identification module for The locked target scanning area is optically identified.
  • the boundary feature is obtained by identifying a difference between a color of the target scanning area itself and a color outside the target scanning area.
  • the boundary feature is obtained by identifying a graphic or color defining a boundary of the target scanning area.
  • the mobile device further includes a judging module, configured to determine, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement, and return to the locking module when the requirement is met.
  • the determining module is specifically configured to determine, according to the current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm, and when the correction can be performed by an error correction algorithm, determine that the current scanning angle meets the requirement.
  • the optical identification module is specifically configured to optically identify and correct the locked target scanning area when the current scanning angle meets the requirement.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, wherein the angle is an angle between the scanned light and the target scanning area plane.
  • the mobile device further includes an error correction and restoration module, and the error correction and restoration module is configured to perform optical recognition by using an error correction algorithm when the locked target scanning area is deformed and the deformation is within a predetermined range.
  • the subsequent target scanning area performs error correction and restoration.
  • the target scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
  • the present invention locks the target scanning area according to the boundary feature of the target scanning area before performing optical recognition; and optically identifies the locked target scanning area. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, enabling rapid scanning recognition and reducing the load on the scanning device.
  • FIG. 1 is a flow chart of an embodiment of an anti-counterfeiting method of the present invention
  • FIG. 2 is a flow chart of an embodiment of an optical recognition method of the present invention
  • FIG. 3 is a flow chart of another embodiment of the optical recognition method of the present invention.
  • FIG. 4 is a schematic structural view of an embodiment of an anti-counterfeit label of the present invention.
  • FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 6 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 7 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention.
  • FIG. 9 is a flow chart of an embodiment of a method for manufacturing an anti-counterfeit label of the present invention.
  • FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
  • FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
  • FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention.
  • FIG. 1 is a flowchart of an embodiment of an anti-counterfeiting method according to the present invention, including:
  • Step S101 The first data that uniquely identifies the corresponding object is saved in the authentication server.
  • the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
  • Step S102 The mobile device acquires first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
  • the anti-counterfeiting information is used to uniquely identify the corresponding object, and may indicate that the object is not a counterfeit product.
  • the mobile device After the mobile device identifies the anti-counterfeiting information, the first data is obtained, and the first data can uniquely identify the corresponding object.
  • the mobile device can use the built-in camera to identify the anti-counterfeiting information.
  • the step S102 specifically includes: capturing, by using a mobile device with a camera, an image of the identifier or the anti-counterfeit tag located on the object, and performing optical recognition to obtain the first One data.
  • the image of the identification or security label on the object includes, but is not limited to, text, characters, combinations of text and characters, two-dimensional codes or barcodes, and the like.
  • the image of the anti-counterfeit label on the object is collected by a mobile device with a camera, wherein the anti-counterfeit label comprises a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles to the base layer, and drying and solidifying, the drip layer At least the number and location of the particles in the particle are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • A includes: scanning an image of the security label on the object with a mobile device with a camera; first, locking the target scanning area according to the boundary feature of the target scanning area; and then acquiring an image of the security label of the locked target scanning area.
  • the target scanning area refers to the scanning area that is indispensable for identifying the anti-counterfeiting information. If the target scanning area is smaller than the target scanning area, incomplete anti-counterfeiting information is obtained, and the target anti-counterfeiting information can be obtained by the target scanning area.
  • the scanning area where the security label is located is a relatively large area. In this area, not all information is necessary, and some areas are still blank areas. In order to improve scanning speed and efficiency, setting boundary features around the target scanning area helps. Quickly lock the target scanning area, and only identify the anti-counterfeiting information of the target scanning area, which can obtain complete anti-counterfeiting information and improve scanning speed and efficiency.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
  • the number and position of the particles in the drip layer are optically identified, and the number and position of the particles in the identified drip layer are sequentially combined into the first data.
  • the format of the first data is defined by a predetermined rule.
  • the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
  • the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
  • the rule of the format of the first data is not limited to the above manner, and is not limited herein.
  • B specifically: optically recognizing the number, position and color of the particles in the drip layer, and identifying the drip film
  • the number, position and color of the particles in the layer are sequentially combined into the first data, wherein all the particles in the drip layer are at least one color, and if the color of the particles is two or more, the distribution of the colors is also random. of.
  • the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
  • Step S103 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data is a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
  • the second data includes a predetermined number of digits in the number of the mobile device, an International Mobile Subscriber Identity (IMSI) or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI. Data that is unique to the mobile device can be obtained, and the privacy of the user can be protected. For example, the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
  • the scanning time is 10:15 on May 20, 2013, the location is Beijing
  • the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
  • the second data is 1305201015beijing.
  • the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
  • the code of the predetermined number of bits in the number of the mobile device, the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity (IMEI), and the time data of the mobile device's local scanning may be moved.
  • the location data scanned by the device, or the combined data of the time data scanned by the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
  • Step S104 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
  • the first data is 1234
  • the second data is 5678
  • the mapping data ABCD of the first data and the mapping data of the second data are EFGH
  • the mapping data in which the first data and the second data are combined is ABCDEFGH.
  • the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
  • the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
  • the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
  • Step S105 The mobile device receives the authentication result from the authentication server.
  • the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
  • the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
  • the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
  • the verification result is a real label
  • the first data obtained this time is attached 01021548498.
  • the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
  • the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or
  • the mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data.
  • the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
  • the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
  • the second data obtained by the mobile device itself is 1305301305beijing
  • the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
  • the authentication server does not send the second data, it indicates that the product is the first verification
  • the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
  • the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
  • the authentication server sends the authentication result to the mobile device.
  • the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
  • the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
  • step S102 when the mobile device acquires the identification of the anti-counterfeiting information, an optical identification method is involved.
  • FIG. 2 and FIG. 3 are flowcharts of two embodiments of the optical identification method of the present invention, including:
  • Step S201 Before performing optical recognition, the target scanning area is locked according to the boundary feature of the target scanning area.
  • the target scanning area refers to a scanning area that is indispensable for effective optical recognition. If the target scanning area is smaller than the target scanning area, incomplete optical identification information is obtained, and the optical identification information can be obtained by the target scanning area.
  • the scanning area is a relatively large area in which not all information is necessary, and some areas are still blank areas.
  • boundary features are set around the target scanning area. Helps quickly lock the target scanning area and optically recognize only the target scanning area, which can obtain complete optical identification information and improve scanning speed and efficiency.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • Step S202 Optically identifying the locked target scanning area.
  • the scanning method is that each line sweeps from the head to the tail, and the non-optical scanning area also takes a lot of time during the scanning, and also increases the load of the scanning device. In the above manner, the purpose of fast scan recognition can be achieved, and the load of the scanning device is reduced.
  • the embodiment of the present invention can quickly lock the target scanning area by the boundary feature of the target scanning area, thereby improving the speed of scanning recognition and reducing the load of the mobile device when performing identification.
  • step S203 is included, and the specific content of step S203 is:
  • Step S203 Determine whether the angle of the scanning meets the requirement according to the boundary feature of the target scanning area. If the requirement is met, step S201 is performed; otherwise, step S201 is not performed.
  • the step of determining whether the angle of the scanning meets the requirements according to the boundary feature of the target scanning area includes:
  • A1 Under the current scanning angle, it is determined whether the boundary feature of the target scanning area can be corrected by an error correction algorithm.
  • the boundary characteristics of the target scanning area are usually deformed, and the scanning device may not be able to lock the boundary feature of the target scanning area without processing. . Therefore, within a certain range of scanning angles, correction can be performed by an error correction algorithm, so that the scanning device can still lock the boundary features of the target scanning area. When the correction can be made by the error correction algorithm, the current scanning angle is satisfactory.
  • step S202 the specific content of step S202 is: if the current scanning angle satisfies the requirement, optically recognize and correct the locked target scanning area.
  • the locked target scanning area is optically recognized while being corrected by the error correction algorithm to obtain the corrected identification information.
  • the target scanning area boundary feature is not corrected when the target scanning area is locked by the target scanning area boundary feature, that is, the scanning device automatically locks the target scanning area by the target scanning area boundary feature, then the target scanning area is optically When identifying, the result of optical recognition can also be corrected according to the actual situation.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, and the angle is an angle between the scanned light and the plane of the target scanning area.
  • the first threshold is 75 degrees and the second threshold is 105 degrees.
  • the defined boundary feature is a rectangle
  • the rectangle sensed on the mobile device is deformed, and the deformation is in a predetermined relationship with the tilt angle, and the tilt angle is obtained by using the predetermined relationship and the obtained degree of deformation.
  • the boundary features of the target scan area are not easily recognized, or an error is recognized, resulting in that the target scan area cannot be correctly locked.
  • the method further comprises: performing error correction and restoration on the optically recognized target scanning area by using an error correction algorithm if the locked target scanning area is deformed and deformed within a predetermined range.
  • the target scanning area is a rectangular anti-counterfeit label, and the anti-counterfeiting label is attached to a spherical or curved cup.
  • the target scanning area is deformed by being attached to a spherical or curved cup, and becomes a ring or an arc. If the deformation is within a predetermined range, the error correction algorithm may be used to correct and restore the optically recognized target scanning area.
  • the target scanning area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the target scanning area is locked according to the boundary feature of the target scanning area; and the locked target scanning area is optically recognized. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, and the scanning and identification can be quickly performed, thereby reducing the load on the scanning device.
  • step S102 if the image of the security label located on the object is collected by the mobile device, the anti-counterfeit label of the present invention shown in the following figure, the anti-counterfeiting method related to the anti-counterfeit label, and the manufacturing method of the anti-counterfeit label are also involved here. .
  • FIG. 4 is a schematic structural diagram of an anti-counterfeit label according to an embodiment of the present invention.
  • the anti-counterfeit label 10 includes a base layer 101 and a drip layer 102.
  • the drip layer 102 is composed of a colloid 1022 including a plurality of particles 1021. After being dispersed into the base layer 101, it is formed by drying and solidification, wherein at least the number and position of the particles 1021 in the drip film layer 102 are random.
  • Anti-counterfeit label 10 also known as anti-counterfeit label or anti-counterfeit trademark, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachment of the subject matter (such as merchandise listing, business card and security card), with anti-counterfeiting The identity of the role.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the drip film in the anti-counterfeit label comprises a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention.
  • the anti-counterfeit label 20 includes a base layer 201 and a drip layer 202.
  • the drip layer 202 is a colloid comprising a plurality of particles 2021. After 2022 is dispersed into the base layer 201, it is formed by drying and solidification, wherein at least the number and position of the particles 2021 in the drip film layer 202 are random.
  • the base layer 201 is printed with a coordinate system 2011, a random number of particles 2021 are randomly distributed in the coordinate system 2011, and a droplet layer 202 is first recorded after the formation of the coordinates of all the particles 2021 thereof, and a coordinate sequence forming a predetermined length is recorded in the database. Verify the authenticity when it is to be verified. By printing the coordinate system on the base layer, the anti-counterfeiting accuracy of the security label can be increased.
  • the particle when recording or identifying the coordinates of a particle, if the coordinates of the particle are not easily determined, the particle may be ignored, or the coordinate of the particle may be determined by an algorithm for determining the coordinate. If the number of particles in the drip layer is large, and the number of characters of the particle is combined more than the preset number of characters, the characters after the preset number of characters are ignored.
  • all the particles 2021 in one drip film layer 202 have at least one color, and if the color is two or more, the color distribution is also random. As shown in FIG. 5, there are two color particles, which are red particles 20211 and yellow particles 20212, respectively.
  • the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm.
  • a common scanning device can distinguish individual particles; the other case is the diameter of the particles.
  • ordinary scanning devices cannot distinguish individual particles, and special scanning equipment with tools such as magnifying glasses or low power microscopes is required. Resolve individual particles.
  • the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
  • the colloid in the anti-counterfeit label may be transparent or not transparent. If it is not transparent, it has special requirements for particles or scanning equipment, such as scanning equipment with X-ray irradiation function, or particle belt. There is some kind of marker, and the scanning device is a scanning device with the identification of the marker.
  • the security label 30 further includes a boundary feature: a first rectangle 303 and a second rectangle 304, and the first rectangle 303 and the second rectangle 304 are disposed on the base layer 301, first The area enclosed by the rectangle 303 and the second rectangle 304 is the target scanning area, that is, the area covered by the falling film layer 302.
  • the target scanning area can be quickly locked by the boundary feature first rectangle and the second rectangle.
  • data can be collected without collecting data, thereby improving the speed of scanning and collecting the data of the security label and reducing the load of the scanning device.
  • boundary features may be other specified graphics in addition to the rectangles described above.
  • the boundary feature may also adopt other manners, such as using a specified color or the like at the boundary of the target scanning area, or adopting different colors for the target scanning area and the non-target scanning area, respectively, so that the target scanning area and the non-target scanning area are formed. Obvious boundary features.
  • the anti-counterfeit label in the above FIG. 4 to FIG. 7 may further include a coating covering the base layer and the uppermost layer of the drip film layer, and the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • FIG. 8 is a flowchart of another embodiment of the anti-counterfeiting method of the present invention.
  • the embodiment is a flowchart of an anti-counterfeiting method when the anti-counterfeit tag is the anti-counterfeit tag described in FIG. 4 to FIG. 7 , and includes:
  • Step S301 Scan and collect an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer are at least The quantity and location are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the step of scanning and collecting the image of the security label includes: before acquiring the image of the security label, locking the target scanning area according to the boundary feature of the target scanning area; and collecting the image of the security label for the locked target scanning area.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
  • Step S302 Identifying the number and position of the particles in the drip layer to obtain verification data.
  • the step S302 specifically includes: identifying the number, position, and color of the particles in the drip layer, wherein all the particles in the drip layer have at least one color, and if there are two or more colors, the color distribution is also random. of.
  • the color of the particles is increased, and the distribution of the colors is also random. In this way, the difficulty of counterfeiting the security label is further increased, and the reliability of the security label is improved.
  • the step S302 may specifically include the following content:
  • C1 The number and position of the particles in the identified drip layer are sequentially combined into the first data.
  • C2 one of a predetermined number of digits in the number of the mobile device generated when the first data is to be identified, a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), and a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI The two are combined into the second data.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • C3 The first data and the second data are sequentially combined into the final verification data.
  • the first data basically represents the uniqueness of the security label
  • the second data is a predetermined number of digits in the number of the mobile device generated when the first data is identified, the international mobile user
  • the combination of the code of the predetermined number of bits in the identification code IMSI and the code of the predetermined number of bits in the international mobile device identification code IMEI further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting. If the second data is generated by identifying at least the time data and the location data is sequentially combined, this further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting.
  • Step S303 Find the correct result of the matching verification data in the database. If the correct result of the matching is found, it is determined that the anti-counterfeit label is a real label, otherwise it is determined to be a false label, wherein the correct result is all the particles in the falling layer After the coordinates are dispersed, a coordinate sequence of a predetermined length is formed as a correct result to be recorded in the database to verify the authenticity when to be verified.
  • a coordinate sequence forming a predetermined length is recorded as a correct result in the database, and the verification data is obtained by identifying the number and position of the particles in the drip layer, and thus, in the database If the matching verification data can be found, the anti-counterfeit label is a real label, otherwise it is a fake label. If the verification data includes the combined data of the first data and the second data, and the correct result of the matching verification data is searched according to the first data, if the correct result of the matching is found, the authentication result is determined that the security label is a real label, Otherwise it is judged to be a false label.
  • Embodiments of the present invention scan and collect images of security labels, identify the number and location of particles in the drop layer to obtain verification data, and find the correct results in the database that match the verification data. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • FIG. 9 is a flowchart of an embodiment of a method for manufacturing an anti-counterfeit label according to the present invention, including:
  • Step S401 adding a plurality of particles to the colloid.
  • the materials of the particles herein include, but are not limited to, plastics, metals, ceramics, and the like, and are not limited herein.
  • Colloid also known as colloidal dispersion, is a type of dispersion system in which the diameter of the dispersed particles is between the crude dispersion system and the solution. It may be transparent or non-transparent, and is not limited.
  • step S401 comprises: adding a plurality of particles to the transparent colloid and stirring.
  • Step S402 Dispersing the colloid containing the particles onto the base layer to form a film containing the particles.
  • the step of dispersing the colloid containing the particles onto the base layer comprises: dropping, adding or spraying the colloid containing the particles onto the base layer.
  • the step of forming the film containing the particles comprises: printing a coordinate system on the surface of the substrate, the film being in a printing coordinate system, wherein a random number of particles are randomly distributed in the coordinate system.
  • Printing the coordinate system on the surface of the base layer can better identify the random position coordinates of a random number of particles, and improve the anti-counterfeiting precision of the anti-counterfeit label.
  • the step of printing a coordinate system on the surface of the base layer includes: printing a coordinate system and a boundary feature on the surface of the base layer: a first rectangle and a second rectangle, wherein the area enclosed by the first rectangle and the second rectangle is the target scanning area. That is, the area covered by the drip film layer.
  • the target scanning area can be quickly locked by the boundary feature first rectangle and the second rectangle.
  • data can be collected without collecting data, thereby improving the speed of scanning and collecting the data of the security label and reducing the load of the scanning device.
  • boundary features may be other specified graphics in addition to the rectangles described above.
  • the boundary feature may also adopt other manners, such as using a specified color or the like at the boundary of the target scanning area, or adopting different colors for the target scanning area and the non-target scanning area, respectively, so that the target scanning area and the non-target scanning area are formed. Obvious boundary features.
  • Step S403 The film is dried and solidified, wherein at least the number and position of the particles in the film are random.
  • step S403 the method further includes:
  • D1 Record the coordinates of all or a predetermined number of particles in the film, obtain a coordinate sequence of a predetermined length, and record it in a database to verify the authenticity when it is to be verified.
  • the coating is covered on the base layer and at the top of the drip layer.
  • the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information.
  • the coating may be scraped off.
  • a condition is that the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm, within which a conventional scanning device can resolve individual particles;
  • the diameter of the particles is between 1 micrometer and 10 micrometers, for example 1 micrometer, 5 micrometers or 10 micrometers, in this range, ordinary scanning devices cannot distinguish individual particles, and need to use tools such as a magnifying glass or a low power microscope.
  • Special scanning equipment is able to distinguish individual particles. For anti-counterfeiting labels, if it is necessary to distinguish the individual particles by means of special scanning equipment with tools, this will undoubtedly increase the difficulty of counterfeiting counterfeiting and further improve the reliability of anti-counterfeiting.
  • the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 ⁇ m, such as 2 mm, 50 ⁇ m, and the like.
  • Embodiments of the present invention add a plurality of particles to a colloid; disperse the colloid containing the particles onto the base layer to form a film containing the particles; and dry and solidify the film, wherein at least the number and position of the particles in the film are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • the anti-counterfeiting method is as shown in FIG.
  • FIG. 10 is a flowchart of still another embodiment of the anti-counterfeiting method of the present invention, including:
  • Step S501 The first data that uniquely identifies the corresponding object is saved in the authentication server.
  • the first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
  • Step S502 The mobile device scans and collects an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer At least its number and location are random.
  • Anti-counterfeit labels also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). logo.
  • the anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
  • the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
  • Step S502 includes: before acquiring the image of the security label, locking the target scanning area according to the boundary feature of the target scanning area; and collecting the image of the security label for the locked target scanning area.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
  • Step S503 Identify the number and position of the particles in the drip layer, and combine the number and position of the particles in the identified drip layer into the first data in order.
  • the format of the first data is defined by a predetermined rule.
  • the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient.
  • the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200.
  • the rule of the format of the first data is not limited to the above manner, and is not limited herein.
  • Step S503 specifically includes: identifying the number, position, and color of the particles in the drip layer, and sequentially combining the number, position, and color of the particles in the identified drip layer into the first data, wherein the drip layer is The color of all particles is at least one. If the color of the particles is two or more, the distribution of colors is also random.
  • the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
  • Step S504 After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data is a number of predetermined digits in the number of the mobile device, or a code IMSI of a predetermined number of bits in the International Mobile Subscriber Identity, or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • the mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device.
  • the second data comprises a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity IMEI
  • the code for the predetermined number of bits so that both the uniqueness of the mobile device data and the privacy of the user can be protected.
  • the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved.
  • the scanning time is 10:15 on May 20, 2013, the location is Beijing
  • the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device.
  • the second data is 1305201015beijing.
  • the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
  • the predetermined number of digits in the number of the mobile device may be associated with the mobile device.
  • the combined time data of the scanned time data, the location data scanned by the mobile device, or the combined time data of the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
  • Step S505 The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct. The results are recorded in the database to verify the authenticity when verification is required.
  • the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data,
  • the first data is 1234
  • the second data is 5678
  • the mapping data ABCD of the first data and the mapping data of the second data are EFGH
  • the mapping data in which the first data and the second data are combined is ABCDEFGH.
  • the mapping data may be back-mapped in the verification server to obtain the first data and the second data.
  • the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
  • the mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
  • Step S506 The mobile device receives the authentication result from the authentication server.
  • the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server.
  • the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data.
  • the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example,
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888.
  • the verification result is a real label
  • the first data obtained this time is attached 01021548498.
  • the second data 788888 when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
  • the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or
  • the mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data.
  • the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server.
  • the second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified.
  • the second data obtained by the mobile device itself is 1305301305beijing
  • the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people.
  • the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888
  • the authentication server does not send the second data, it indicates that the product is the first verification
  • the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product
  • the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
  • the authentication server sends the authentication result to the mobile device.
  • the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
  • the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
  • a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
  • FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention.
  • the mobile device includes: a scan acquisition module 11 , a first data obtaining module 12 , a second data obtaining module 13 , a sending module 14 , and a receiving module 15 .
  • the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG.
  • the scan acquisition module 11 is configured to scan and collect an image of the security label.
  • the anti-counterfeit label includes a base layer and a drip layer.
  • the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying. At least the number and location of the particles are random.
  • the scan acquisition module 11 is further configured to: before acquiring the image of the security label, lock the target scan area according to the boundary feature of the target scan area; and collect an image of the security label for the locked target scan area.
  • the first data obtaining module 12 is configured to identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
  • the first data obtaining module 12 is specifically configured to identify the number, position, and color of the particles in the drip layer, and combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
  • the second data obtaining module 13 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile Equipment Identity
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the sending module 14 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the receiving module 15 is configured to receive the authentication result from the authentication server.
  • the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence.
  • a data the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
  • FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention.
  • the mobile device includes: a first data obtaining module 21, a second data obtaining module 22, a sending module 23, and a receiving module 24.
  • the mobile device of this embodiment may perform step S102 to step S105 in the method flow shown in FIG. 1 .
  • the first data obtaining module 21 is configured to acquire first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
  • the first data obtaining module 21 is specifically configured to collect an image of the identification or anti-counterfeit label located on the object by using the mobile device with the camera, and perform optical recognition to obtain the first data.
  • Identification or security labels include, but are not limited to, text, or characters, or a combination of text and characters, or a two-dimensional code or barcode.
  • the first data obtaining module 21 includes: a third collecting unit and a first data obtaining unit.
  • the third collecting unit is configured to collect an image of the anti-counterfeit label on the object by using a mobile device with a camera, wherein the anti-counterfeiting label comprises a base layer and a drip layer, and the drip layer is dispersed and solidified by a colloid containing a plurality of particles to the base layer. Formed, at least the number and location of the particles in the drip layer are random.
  • the first data obtaining unit is configured to optically identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
  • the first data obtaining unit is specifically configured to optically identify the number, position, and color of the particles in the drip layer, and sequentially combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
  • the first data obtaining module 21 further includes a first collecting unit, configured to scan an image of the security label on the object with the mobile device with the camera; before the image of the security label is collected, according to the boundary of the target scanning area The feature locks the target scan area; the captured image of the security label is captured for the locked target scan area.
  • a first collecting unit configured to scan an image of the security label on the object with the mobile device with the camera; before the image of the security label is collected, according to the boundary of the target scanning area The feature locks the target scan area; the captured image of the security label is captured for the locked target scan area.
  • the second data obtaining module 22 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
  • the second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or one of the codes of the predetermined number of bits in the International Mobile Equipment Identity IMEI.
  • the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
  • the sending module 23 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct.
  • the results are recorded in the database to verify the authenticity when verification is required.
  • the receiving module 24 is configured to receive the authentication result from the authentication server.
  • the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
  • FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention.
  • the mobile device includes: a locking module 31 and an optical recognition module 32.
  • the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG. 2 and FIG.
  • the locking module 31 is configured to lock the target scanning area according to the target scanning area boundary feature before performing optical recognition.
  • the target scanning area refers to a scanning area that is indispensable for effective optical recognition. If the target scanning area is smaller than the target scanning area, incomplete optical identification information is obtained, and the optical identification information can be obtained by the target scanning area.
  • the scanning area is a relatively large area in which not all information is necessary, and some areas are still blank areas.
  • boundary features are set around the target scanning area. Helps quickly lock the target scanning area and optically recognize only the target scanning area, which can obtain complete optical identification information and improve scanning speed and efficiency.
  • the target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively.
  • the target scan area and the non-target scan area are made to form a distinct boundary feature.
  • the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area.
  • the out-of-target scan area ie, the non-target scan area
  • the target scan area uses a white color
  • the boundary feature can be quickly obtained based on the difference between the two colors.
  • the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area.
  • the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area.
  • the area enclosed by colors such as red and red is the target scanning area.
  • the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
  • the optical identification module 32 is for optically identifying the locked target scanning area.
  • the embodiment of the present invention can quickly lock the target scanning area by the boundary feature of the target scanning area, thereby improving the speed of scanning recognition and reducing the load of the mobile device when performing identification.
  • the mobile device further includes a judging module, wherein the judging module is configured to judge whether the angle of the scanning meets the requirement according to the boundary feature of the target scanning area, and return to the locking module 31 when the requirement is met.
  • the determining module is specifically configured to determine whether the boundary feature of the target scanning area can be corrected by the error correction algorithm under the current scanning angle, and when the correction can be performed by the error correction algorithm, determine that the current scanning angle satisfies the requirement.
  • the boundary characteristics of the target scanning area are usually deformed, and the scanning device may not be able to lock the boundary feature of the target scanning area without processing. . Therefore, within a certain range of scanning angles, correction can be performed by an error correction algorithm, so that the scanning device can still lock the boundary features of the target scanning area. When the correction can be made by the error correction algorithm, the current scanning angle is satisfactory.
  • the optical identification module 32 is specifically configured to optically recognize and correct the locked target scanning area when the current scanning angle satisfies the requirement.
  • the locked target scanning area is optically recognized while being corrected by the error correction algorithm to obtain the corrected identification information.
  • the target scanning area boundary feature is not corrected when the target scanning area is locked by the target scanning area boundary feature, that is, the scanning device automatically locks the target scanning area by the target scanning area boundary feature, then the target scanning area is optically When identifying, the result of optical recognition can also be corrected according to the actual situation.
  • the requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, and the angle is an angle between the scanned light and the plane of the target scanning area.
  • the first threshold is 75 degrees and the second threshold is 105 degrees.
  • the defined boundary feature is a rectangle
  • the rectangle sensed on the mobile device is deformed, and the deformation is in a predetermined relationship with the tilt angle, and the tilt angle is obtained by using the predetermined relationship and the obtained degree of deformation.
  • the boundary features of the target scan area are not easily recognized, or an error is recognized, resulting in that the target scan area cannot be correctly locked.
  • the mobile device further includes an error correction and restoration module, and the error correction and restoration module is configured to perform error correction and restoration on the optically recognized target scanning area by using an error correction algorithm when the locked target scanning area is deformed and deformed within a predetermined range. .
  • the target scanning area is a rectangular anti-counterfeit label, and the anti-counterfeiting label is attached to a spherical or curved cup.
  • the target scanning area is deformed by being attached to a spherical or curved cup, and becomes a ring or an arc. If the deformation is within a predetermined range, the error correction algorithm may be used to correct and restore the optically recognized target scanning area.
  • the target scan area is an anti-counterfeit label.
  • the anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
  • the target scanning area is locked according to the boundary feature of the target scanning area; and the locked target scanning area is optically recognized. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, and the scanning and identification can be quickly performed, thereby reducing the load on the scanning device.

Abstract

An optical recognition method comprises: before optical scanning recognition is performed, locking a target scanning region according to a boundary characteristic of the target scanning region; and performing optical scanning on the locked target scanning region. By using the method, fast scanning recognition can be performed, and load of a scanning device can be reduced.

Description

光学识别方法及移动设备  Optical recognition method and mobile device
【技术领域】[Technical Field]
本发明涉及防伪技术领域,特别是涉及一种光学识别方法及移动设备。The present invention relates to the field of anti-counterfeiting technology, and in particular to an optical recognition method and a mobile device.
【背景技术】【Background technique】
在物品交易中,防伪是一个重要的命题。在验证防伪标签的时候,通常首先需要对防伪标签进行扫面采集防伪信息。通常情况下,在对防伪标签进行扫描时,是逐行逐行的扫描,即使所扫描的区域不是目的区域,这样扫描的速度很慢,也增加了扫描设备的负载。Anti-counterfeiting is an important proposition in the trading of goods. When verifying the anti-counterfeit label, it is usually necessary to first scan the anti-counterfeit label for anti-counterfeiting information. Normally, when scanning an anti-counterfeit label, it is a progressive scan line by line. Even if the scanned area is not the destination area, the scanning speed is slow, which increases the load of the scanning device.
【发明内容】 [Summary of the Invention]
本发明主要解决的技术问题是提供一种光学识别方法及移动设备,能够快速扫描识别光学扫描区域,减小扫描设备的负荷。The technical problem to be solved by the present invention is to provide an optical recognition method and a mobile device capable of quickly scanning and identifying an optical scanning area and reducing the load of the scanning device.
为解决上述技术问题,本发明提供一种光学识别方法,包括:在进行光学识别前,根据目标扫描区域边界特征锁定所述目标扫描区域;对锁定的所述目标扫描区域进行光学识别。In order to solve the above technical problem, the present invention provides an optical recognition method comprising: locking the target scanning area according to a boundary feature of a target scanning area before performing optical recognition; and optically identifying the locked target scanning area.
其中,所述边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。Wherein, the boundary feature is obtained by identifying a difference between a color of the target scanning area itself and a color outside the target scanning area.
其中,所述边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。Wherein the boundary feature is obtained by identifying a graphic or color defining a boundary of the target scanning area.
其中,所述根据目标扫描区域边界特征锁定所述目标扫描区域的步骤之前包括:根据所述目标扫描区域边界特征判断进行扫描的角度是否满足要求,若满足要求则执行所述根据目标扫描区域边界特征锁定所述目标扫描区域的步骤,否则不执行所述根据目标扫描区域边界特征锁定所述目标扫描区域的步骤。The step of locking the target scanning area according to the boundary feature of the target scanning area includes: determining, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement, and performing the boundary according to the target scanning area if the requirement is met The step of feature locking the target scan area, otherwise the step of locking the target scan area according to the target scan area boundary feature is not performed.
其中,所述根据所述目标扫描区域边界特征判断进行扫描的角度是否满足要求的步骤包括:在当前扫描角度下,判断所述目标扫描区域边界特征是否能够通过纠错算法进行纠正;若能够通过纠错算法进行纠正,则当前扫描角度满足要求。The step of determining, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement includes: determining, at the current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm; The error correction algorithm corrects the current scan angle to meet the requirements.
其中,所述对锁定的所述目标扫描区域进行光学识别的步骤包括:若当前扫描角度满足要求,则对锁定的所述目标扫描区域进行光学识别和纠正。The step of optically recognizing the locked target scanning area includes optically recognizing and correcting the locked target scanning area if the current scanning angle satisfies the requirement.
其中,所述进行扫描的角度满足的要求是:所述角度大于等于第一阈值且小于等于第二阈值,其中,所述角度是进行扫描的光线与所述目标扫描区域平面的夹角。The requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, wherein the angle is an angle between the scanned light and the target scanning area plane.
其中,所述对锁定的所述目标扫描区域进行光学识别的步骤之后,包括:若锁定的所述目标扫描区域发生变形且所述变形在预定范围内,则利用纠错算法对光学识别后的所述目标扫描区域进行纠错与还原。The step of optically recognizing the locked target scanning area includes: if the locked target scanning area is deformed and the deformation is within a predetermined range, the optical recognition is performed by using an error correction algorithm The target scanning area performs error correction and restoration.
其中,所述目标扫描区域是防伪标签。The target scanning area is an anti-counterfeit label.
其中,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。Wherein, the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
为解决上述技术问题,本发明提供一种移动设备,所述移动设备包括:锁定模块,用于在进行光学识别前,根据目标扫描区域边界特征锁定所述目标扫描区域;光学识别模块,用于对锁定的所述目标扫描区域进行光学识别。In order to solve the above technical problem, the present invention provides a mobile device, comprising: a locking module, configured to lock the target scanning area according to a boundary feature of a target scanning area before performing optical recognition; and an optical identification module for The locked target scanning area is optically identified.
其中,所述边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。Wherein, the boundary feature is obtained by identifying a difference between a color of the target scanning area itself and a color outside the target scanning area.
其中,所述边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。Wherein the boundary feature is obtained by identifying a graphic or color defining a boundary of the target scanning area.
其中,所述移动设备还包括判断模块,所述判断模块用于根据所述目标扫描区域边界特征判断进行扫描的角度是否满足要求,在满足要求时返回所述锁定模块。The mobile device further includes a judging module, configured to determine, according to the boundary feature of the target scanning area, whether the angle of the scanning meets the requirement, and return to the locking module when the requirement is met.
其中,所述判断模块具体用于在当前扫描角度下,判断所述目标扫描区域边界特征是否能够通过纠错算法进行纠正,在能够通过纠错算法进行纠正时,确定当前扫描角度满足要求。The determining module is specifically configured to determine, according to the current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm, and when the correction can be performed by an error correction algorithm, determine that the current scanning angle meets the requirement.
其中,所述光学识别模块具体用于在当前扫描角度满足要求时,对锁定的所述目标扫描区域进行光学识别和纠正。The optical identification module is specifically configured to optically identify and correct the locked target scanning area when the current scanning angle meets the requirement.
其中,所述进行扫描的角度满足的要求是:所述角度大于等于第一阈值且小于等于第二阈值,其中,所述角度是进行扫描的光线与所述目标扫描区域平面的夹角。The requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, wherein the angle is an angle between the scanned light and the target scanning area plane.
其中,所述移动设备还包括纠错与还原模块,所述纠错与还原模块用于在锁定的所述目标扫描区域发生变形且所述变形在预定范围内时,利用纠错算法对光学识别后的所述目标扫描区域进行纠错与还原。The mobile device further includes an error correction and restoration module, and the error correction and restoration module is configured to perform optical recognition by using an error correction algorithm when the locked target scanning area is deformed and the deformation is within a predetermined range. The subsequent target scanning area performs error correction and restoration.
其中,所述目标扫描区域是防伪标签。The target scanning area is an anti-counterfeit label.
其中,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。Wherein, the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying, at least the number and position of the particles in the drip layer It is random.
区别现有技术的情况,本发明在进行光学识别前,根据目标扫描区域边界特征锁定目标扫描区域;对锁定的目标扫描区域进行光学识别。由于在目标扫描区域设置了边界特征,通过这种方式,可以快速锁定目标扫描区域,能够进行快速扫描识别,减少扫描设备的负荷。Different from the prior art, the present invention locks the target scanning area according to the boundary feature of the target scanning area before performing optical recognition; and optically identifies the locked target scanning area. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, enabling rapid scanning recognition and reducing the load on the scanning device.
【附图说明】 [Description of the Drawings]
图1是本发明防伪方法一实施方式的流程图;1 is a flow chart of an embodiment of an anti-counterfeiting method of the present invention;
图2是本发明光学识别方法一实施方式的流程图;2 is a flow chart of an embodiment of an optical recognition method of the present invention;
图3是本发明光学识别方法另一实施方式的流程图;3 is a flow chart of another embodiment of the optical recognition method of the present invention;
图4是本发明防伪标签一实施方式的结构示意图;4 is a schematic structural view of an embodiment of an anti-counterfeit label of the present invention;
图5是本发明防伪标签另一实施方式的结构示意图;5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention;
图6是本发明防伪标签又一实施方式的结构示意图;6 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention;
图7是本发明防伪标签又一实施方式的结构示意图;7 is a schematic structural view of still another embodiment of the anti-counterfeit label of the present invention;
图8是本发明防伪方法另一实施方式的流程图;8 is a flow chart of another embodiment of the anti-counterfeiting method of the present invention;
图9是本发明防伪标签制造方法一实施方式的流程图;9 is a flow chart of an embodiment of a method for manufacturing an anti-counterfeit label of the present invention;
图10是本发明防伪方法又一实施方式的流程图;10 is a flow chart of still another embodiment of the anti-counterfeiting method of the present invention;
图11是本发明移动设备一实施方式的结构示意图;11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention;
图12是本发明移动设备另一实施方式的结构示意图;12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention;
图13是本发明移动设备又一实施方式的结构示意图。FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention.
【具体实施方式】 【detailed description】
下面结合附图和实施方式对本发明进行详细说明。The invention will now be described in detail in conjunction with the drawings and embodiments.
参阅图1,图1是本发明防伪方法一实施方式的流程图,包括:Referring to FIG. 1, FIG. 1 is a flowchart of an embodiment of an anti-counterfeiting method according to the present invention, including:
步骤S101:将唯一标识相应物体的第一数据保存在鉴别服务器中。Step S101: The first data that uniquely identifies the corresponding object is saved in the authentication server.
唯一标识相应物体的第一数据即为该物体的防伪信息。由于第一数据的唯一性,根据第一数据可以辨别该物体的真假。The first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
步骤S102:移动设备获取对防伪信息进行识别而得到的第一数据,第一数据用以唯一标识相应物体。Step S102: The mobile device acquires first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
防伪信息用于唯一标识相应的物体,可以表明该物体不是假冒伪劣产品,移动设备对防伪信息进行识别后,获得第一数据,该第一数据即可以唯一标识相应物体。The anti-counterfeiting information is used to uniquely identify the corresponding object, and may indicate that the object is not a counterfeit product. After the mobile device identifies the anti-counterfeiting information, the first data is obtained, and the first data can uniquely identify the corresponding object.
其中,移动设备可以使用自带的摄像头对防伪信息进行识别,此时步骤S102具体包括:用带有摄像头的移动设备采集位于物体上的标识或防伪标签的图像,并进行光学识别,以获得第一数据。物体上的标识或防伪标签的图像包括但不限于文字、字符、文字和字符的组合、二维码或条形码等等。The mobile device can use the built-in camera to identify the anti-counterfeiting information. In this step, the step S102 specifically includes: capturing, by using a mobile device with a camera, an image of the identifier or the anti-counterfeit tag located on the object, and performing optical recognition to obtain the first One data. The image of the identification or security label on the object includes, but is not limited to, text, characters, combinations of text and characters, two-dimensional codes or barcodes, and the like.
其中,用带有摄像头的移动设备采集位于物体上的标识或防伪标签的图像,并进行光学识别,以获得第一数据的步骤具体包括:The step of acquiring an image of the identifier or the security label on the object by using the mobile device with the camera and performing optical recognition to obtain the first data specifically includes:
A.用带有摄像头的移动设备采集物体上的防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。A. The image of the anti-counterfeit label on the object is collected by a mobile device with a camera, wherein the anti-counterfeit label comprises a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles to the base layer, and drying and solidifying, the drip layer At least the number and location of the particles in the particle are random.
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。Anti-counterfeit labels, also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). Logo. The anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label. In the embodiment of the invention, the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
其中,A包括:用带有摄像头的移动设备对物体上的防伪标签的图像进行扫描;首先,根据目标扫描区域边界特征锁定目标扫描区域;然后,采集锁定的目标扫描区域防伪标签的图像。Wherein, A includes: scanning an image of the security label on the object with a mobile device with a camera; first, locking the target scanning area according to the boundary feature of the target scanning area; and then acquiring an image of the security label of the locked target scanning area.
目标扫描区域是指为识别防伪信息而必不可少的扫描区域,小于目标扫描区域则获得不完整的防伪信息,大于等于目标扫描区域均可以获得完整的防伪信息。The target scanning area refers to the scanning area that is indispensable for identifying the anti-counterfeiting information. If the target scanning area is smaller than the target scanning area, incomplete anti-counterfeiting information is obtained, and the target anti-counterfeiting information can be obtained by the target scanning area.
防伪标签所在的扫描区域是比较大的区域,在该区域并不是所有的信息是必要的,有些区域还是空白区域,为了提高扫描速度和效率,在目标扫描区域的周围设置边界特征,有助于快速锁定目标扫描区域,只对目标扫描区域进行防伪信息的识别,既可以获得完整的防伪信息,又可以提高扫描速度和效率。The scanning area where the security label is located is a relatively large area. In this area, not all information is necessary, and some areas are still blank areas. In order to improve scanning speed and efficiency, setting boundary features around the target scanning area helps. Quickly lock the target scanning area, and only identify the anti-counterfeiting information of the target scanning area, which can obtain complete anti-counterfeiting information and improve scanning speed and efficiency.
目标扫描区域边界特征是指可以锁定目标扫描区域的边界特征,例如,在目标扫描区域的边界使用指定的颜色、指定的图形等,或者将目标扫描区域和非目标扫描区域分别采用不同的色彩,使得目标扫描区域和非目标扫描区域形成明显的边界特征。The target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively. The target scan area and the non-target scan area are made to form a distinct boundary feature.
具体来说,边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。例如,目标扫描区域外(即非目标扫描区域)使用黑色的颜色,目标扫描区域使用白色的颜色,据此两种颜色之间的差异即可很快获得边界特征。Specifically, the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area. For example, the out-of-target scan area (ie, the non-target scan area) uses a black color, and the target scan area uses a white color, and the boundary feature can be quickly obtained based on the difference between the two colors.
另外,边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。例如:在目标扫描区域的两边设置边界特征:两个矩形,两个矩形的宽度和两个矩形之间的距离所围成的区域即为目标扫描区域;或在目标扫描区域的边界设置指定的色彩,如红色,红色所围成的区域即为目标扫描区域。In addition, the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area. For example, the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area. The area enclosed by colors such as red and red is the target scanning area.
比如,如果在锁定目标扫描区域的过程中,如果移动设备的屏幕上目标扫描区域周围显示不闪烁的绿框,则表示目标扫描区域锁定成功;如果正在锁定目标扫描区域,则可以显示闪烁的绿框;如果锁定目标扫描区域失败,则显示红框或不显示颜色框。For example, if a green frame that does not blink is displayed around the target scanning area on the screen of the mobile device during the locking of the target scanning area, the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
通过目标扫描区域的边界特征,可以快速锁定目标扫描区域,从而可以提高扫描识别的速度,减少移动设备在进行识别时的负载。Through the boundary feature of the target scanning area, the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
B.光学识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。B. The number and position of the particles in the drip layer are optically identified, and the number and position of the particles in the identified drip layer are sequentially combined into the first data.
利用预定的规则对第一数据的格式进行定义,例如,第一数据要求是10个字符,如果规定坐标的位数是两位时,默认规定仅体现5个粒子的信息,字符不够的位数以零来补充,在滴膜层中有两个粒子,位置坐标分别是(0,2)和(5,3),按照横坐标由小到大的方向组合为0253(规定坐标的位数是两位)或00020503(规定坐标的位数是四位),则第一数据为0253000000或0002050300;按照纵坐标有大到小的方向组合为5302(规定坐标的位数是两位)或05030002(规定坐标的位数是四位),则第一数据为5302000000或0503000200。如果滴膜层中粒子的数量很多,粒子的位置坐标组合在一起后字符数多于10,则将10个字符以后的字符忽略,不计入第一数据中。当然,在实际应用中,第一数据的格式的规则的制定并不限于上述方式,在此不做限制。The format of the first data is defined by a predetermined rule. For example, the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient. Supplemented by zero, there are two particles in the drip layer, the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200. If the number of particles in the drip layer is large, and the position coordinates of the particles are combined and the number of characters is more than 10, the characters after 10 characters are ignored and are not included in the first data. Of course, in practical applications, the rule of the format of the first data is not limited to the above manner, and is not limited herein.
其中,滴膜层中的粒子除了数量、位置的差别外,还有颜色的差别,即B具体可为:光学识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果粒子颜色为两种或两种以上,则颜色的分布也是随机的。Among them, in addition to the difference in the number and position of the particles in the drip layer, there is also a difference in color, that is, B specifically: optically recognizing the number, position and color of the particles in the drip layer, and identifying the drip film The number, position and color of the particles in the layer are sequentially combined into the first data, wherein all the particles in the drip layer are at least one color, and if the color of the particles is two or more, the distribution of the colors is also random. of.
例如红色是01,黄色是02,黑色是03,绿色是04等等,如果上述的两个粒子一个是红色,一个是绿色,那么按照横坐标由小到大的方向且颜色有大到小的顺序进行排列组合,第一数据为0253010400(规定坐标的位数是两位)或者000205030104(规定坐标的位数是四位)。For example, red is 01, yellow is 02, black is 03, green is 04, etc. If the above two particles are red and one is green, then the direction from small to large and the color is large to small. The order is combined and arranged, the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
步骤S103:在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。Step S103: After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
第二数据是移动设备的号码中预定位数的号码,或者是国际移动用户识别码IMSI中预定位数的代码,或者是国际移动设备识别码IMEI中预定位数的代码。The second data is a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
移动用户的号码、国际移动用户识别码IMSI以及国际移动设备识别码IMEI对每个移动设备来说都是与移动设备本机关联的唯一性数据。为了保护移动用户的隐私,防止移动用户号码的泄密,第二数据包括移动设备的号码中预定位数号码、国际移动用户识别码IMSI或国际移动设备识别码IMEI中预定位数的代码,这样既可以获得移动设备唯一性的数据,又可以保护用户的隐私。例如,移动设备的号码是13777778888,预定后面的6位,则第二数据是778888。The mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device. In order to protect the privacy of the mobile user and prevent the leakage of the mobile subscriber number, the second data includes a predetermined number of digits in the number of the mobile device, an International Mobile Subscriber Identity (IMSI) or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI. Data that is unique to the mobile device can be obtained, and the privacy of the user can be protected. For example, the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。Alternatively, the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
移动设备本机扫描的时间数据和移动设备本机扫描的地点数据都是与移动设备本机关联的唯一性数据,因此,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或移动设备本机扫描的时间数据和扫描的地点数据的组合数据。例如,扫描的时间是2013年5月20日10点15分,地点是北京,第二数据可以是移动设备本机扫描的时间数据1305201015,或第二数据可以是移动设备本机扫描的地点数据beijing,如果第二数据是移动设备本机扫描的时间数据和扫描的地点数据的组合数据,那么第二数据是1305201015beijing。The time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved. The location data scanned by the device itself, or the combined data of the time data scanned by the mobile device and the scanned location data. For example, the scanning time is 10:15 on May 20, 2013, the location is Beijing, the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device. Beijing, if the second data is the combined data of the time data scanned by the mobile device and the scanned location data, then the second data is 1305201015beijing.
需要说明的是,如果移动设备具备全球定位系统GPS导航功能,则移动设备本机扫描的地点是GPS定位导航的地点,如果移动设备不具备GPS导航功能或者没有开启GPS导航功能,则移动设备本机扫描的地点是该移动设备的号码归属地的地点。It should be noted that if the mobile device has the GPS navigation function of the global positioning system, the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
当然,在实际应用中,也可以将移动设备的号码中预定位数号码、国际移动用户识别码IMSI或国际移动设备识别码IMEI中预定位数的代码与移动设备本机扫描的时间数据、移动设备本机扫描的地点数据、或移动设备本机扫描的时间数据和扫描的地点数据的组合数据进行组合以获得第二数据,在此不做限制。Of course, in practical applications, the code of the predetermined number of bits in the number of the mobile device, the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity (IMEI), and the time data of the mobile device's local scanning may be moved. The location data scanned by the device, or the combined data of the time data scanned by the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
步骤S104:移动设备向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。Step S104: The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct The results are recorded in the database to verify the authenticity when verification is required.
验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,所谓映射数据是指与第一数据和第二数据对应的另外一组数据,例如:第一数据是1234,第二数据是5678,第一数据的映射数据ABCD和第二数据的映射数据是EFGH,那么第一数据和第二数据组合在一起的映射数据是ABCDEFGH。如果验证数据是第一数据和第二数据组合在一起的映射数据,在验证服务器中可以将该映射数据反映射重新获得第一数据和第二数据。当然,在实际应用中,如果第一数据的映射数据和第二数据的映射数据也分别是唯一的,那么也可以以第一数据的映射数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果。The verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data, For example, the first data is 1234, the second data is 5678, the mapping data ABCD of the first data and the mapping data of the second data are EFGH, and the mapping data in which the first data and the second data are combined is ABCDEFGH. If the verification data is mapping data in which the first data and the second data are combined, the mapping data may be back-mapped in the verification server to obtain the first data and the second data. Of course, in practical applications, if the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
移动设备向鉴别服务器发送验证数据,鉴别服务器根据第一数据查找匹配验证数据的正确结果,如果能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。The mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
步骤S105:移动设备接收来自鉴别服务器的鉴别结果。Step S105: The mobile device receives the authentication result from the authentication server.
当鉴别服务器获得鉴别结果后,将该鉴别结果向移动设备发送,移动设备接收来自鉴别服务器的鉴别结果。例如,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据一致时,鉴别服务器向移动设备返回鉴别结果为真实标签,并返回本次的第一数据和第二数据,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据不一致时,鉴别服务器向移动设备返回鉴别结果为非真实标签,并返回本次的第一数据和第二数据,例如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888,当验证结果为真实标签,返回验证结果时附上本次获得的第一数据0121548498和第二数据788888,当验证结果为非真实标签,返回验证结果时也附上本次获得的第一数据0121548498和第二数据788888。After the authentication server obtains the authentication result, the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server. For example, when the first data in the verification data sent by the mobile device is consistent with the first data saved by the authentication server, the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data. When the first data in the verification data sent by the mobile device is inconsistent with the first data saved by the authentication server, the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example, The second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888. When the verification result is a real label, when the verification result is returned, the first data obtained this time is attached 01021548498. And the second data 788888, when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
或者,鉴别服务器可以将第一次的验证数据保存在鉴别服务器中,在向移动设备发送鉴别结果的时候,将第一次验证保存的与该第一数据对应的验证数据中的第二数据或者第二数据的映射数据也向移动设备发送,如果没有保存的与该第一数据对应的验证数据,则不发送本次与该第一数据对应的验证数据的第二数据或者第二数据的映射数据。在鉴别结果是真实标签时,如果移动设备没有收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品是第一次验证,如果移动设备收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品不是第一次验证,曾经验证过。例如,移动设备本机本次获得的第二数据是1305301305beijing,来自鉴别服务器的第二数据是1305201015beijing,表明在2013年5月20日10点15分钟在北京已经有人验证过该产品,也可以说明该产品曾经被人使用过。又如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888时,如果鉴别服务器没有发送第二数据,表明该产品是第一次验证;如果鉴别服务器发送的第二数据是788888,表明用户使用该移动设备对该产品进行第二次验证;如果鉴别服务器发送的第二数据是785512,表明该产品在另外的移动设备上进行第二次验证,或者该产品曾经验证过,或该产品被人使用过。Alternatively, the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or The mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data. When the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server. The second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified. For example, the second data obtained by the mobile device itself is 1305301305beijing, and the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people. For another example, if the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888, if the authentication server does not send the second data, it indicates that the product is the first verification; If the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product; if the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
当然,鉴别服务器以什么样的方式向移动设备发送鉴别结果,在实际应用中,可以根据实际情况进行确定,并不限于上述方式,在此不做限制。Of course, the authentication server sends the authentication result to the mobile device. In the actual application, the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
本发明实施方式移动设备获取对防伪信息进行识别而得到的第一数据,所述第一数据用以唯一标识相应物体;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据是代表唯一性的数据,特别是第一数据用以唯一标识相应物体,通过这种方式,确保防伪信息的唯一性,仿造者无法复制,提高了防伪的可靠性。In the embodiment of the present invention, the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
在步骤S102中,移动设备获取对防伪信息进行识别时涉及一种光学识别方法,参阅图2和图3,图2和图3是本发明光学识别方法两个实施方式的流程图,包括:In step S102, when the mobile device acquires the identification of the anti-counterfeiting information, an optical identification method is involved. Referring to FIG. 2 and FIG. 3, FIG. 2 and FIG. 3 are flowcharts of two embodiments of the optical identification method of the present invention, including:
步骤S201:在进行光学识别前,根据目标扫描区域边界特征锁定目标扫描区域。Step S201: Before performing optical recognition, the target scanning area is locked according to the boundary feature of the target scanning area.
目标扫描区域是指为进行有效的光学识别而必不可少的扫描区域,小于目标扫描区域则获得不完整的光学识别信息,大于等于目标扫描区域均可以获得完整的光学识别信息。The target scanning area refers to a scanning area that is indispensable for effective optical recognition. If the target scanning area is smaller than the target scanning area, incomplete optical identification information is obtained, and the optical identification information can be obtained by the target scanning area.
在进行光学识别时,扫描区域是比较大的区域,在该区域并不是所有的信息是必要的,有些区域还是空白区域,为了提高扫描速度和效率,在目标扫描区域的周围设置边界特征,有助于快速锁定目标扫描区域,只对目标扫描区域进行光学识别,既可以获得完整的光学识别信息,又可以提高扫描速度和效率。When performing optical recognition, the scanning area is a relatively large area in which not all information is necessary, and some areas are still blank areas. In order to improve scanning speed and efficiency, boundary features are set around the target scanning area. Helps quickly lock the target scanning area and optically recognize only the target scanning area, which can obtain complete optical identification information and improve scanning speed and efficiency.
目标扫描区域边界特征是指可以锁定目标扫描区域的边界特征,例如,在目标扫描区域的边界使用指定的颜色、指定的图形等,或者将目标扫描区域和非目标扫描区域分别采用不同的色彩,使得目标扫描区域和非目标扫描区域形成明显的边界特征。The target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively. The target scan area and the non-target scan area are made to form a distinct boundary feature.
具体来说,边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。例如,目标扫描区域外(即非目标扫描区域)使用黑色的颜色,目标扫描区域使用白色的颜色,据此两种颜色之间的差异即可很快获得边界特征。Specifically, the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area. For example, the out-of-target scan area (ie, the non-target scan area) uses a black color, and the target scan area uses a white color, and the boundary feature can be quickly obtained based on the difference between the two colors.
另外,边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。例如:在目标扫描区域的两边设置边界特征:两个矩形,两个矩形的宽度和两个矩形之间的距离所围成的区域即为目标扫描区域;或在目标扫描区域的边界设置指定的色彩,如红色,红色所围成的区域即为目标扫描区域。In addition, the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area. For example, the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area. The area enclosed by colors such as red and red is the target scanning area.
比如,如果在锁定目标扫描区域的过程中,如果移动设备的屏幕上目标扫描区域周围显示不闪烁的绿框,则表示目标扫描区域锁定成功;如果正在锁定目标扫描区域,则可以显示闪烁的绿框;如果锁定目标扫描区域失败,则显示红框或不显示颜色框。For example, if a green frame that does not blink is displayed around the target scanning area on the screen of the mobile device during the locking of the target scanning area, the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
步骤S202:对锁定的目标扫描区域进行光学识别。Step S202: Optically identifying the locked target scanning area.
在传统光学扫描方式中,扫描方法是每一行从头扫到尾,在扫面时那些非光学扫面区域也会花费很多时间,并且也会增加扫描设备的负载。通过上述方式,可以实现快速扫描识别的目的,并减少了扫描设备的负荷。In the conventional optical scanning mode, the scanning method is that each line sweeps from the head to the tail, and the non-optical scanning area also takes a lot of time during the scanning, and also increases the load of the scanning device. In the above manner, the purpose of fast scan recognition can be achieved, and the load of the scanning device is reduced.
本发明实施方式通过目标扫描区域的边界特征,可以快速锁定目标扫描区域,从而可以提高扫描识别的速度,减少移动设备在进行识别时的负载。The embodiment of the present invention can quickly lock the target scanning area by the boundary feature of the target scanning area, thereby improving the speed of scanning recognition and reducing the load of the mobile device when performing identification.
参阅图3,在步骤S201之前包括步骤S203,步骤S203的具体内容是:Referring to FIG. 3, before step S201, step S203 is included, and the specific content of step S203 is:
步骤S203:根据目标扫描区域边界特征判断进行扫描的角度是否满足要求,若满足要求则执行步骤S201,否则不执行步骤S201。Step S203: Determine whether the angle of the scanning meets the requirement according to the boundary feature of the target scanning area. If the requirement is met, step S201 is performed; otherwise, step S201 is not performed.
其中,根据目标扫描区域边界特征判断进行扫描的角度是否满足要求的步骤具体包括:The step of determining whether the angle of the scanning meets the requirements according to the boundary feature of the target scanning area includes:
A1:在当前扫描角度下,判断所述目标扫描区域边界特征是否能够通过纠错算法进行纠正。A1: Under the current scanning angle, it is determined whether the boundary feature of the target scanning area can be corrected by an error correction algorithm.
A2:若能够通过纠错算法进行纠正,则当前扫描角度满足要求。A2: If the correction can be performed by the error correction algorithm, the current scanning angle satisfies the requirement.
在扫描光线没有垂直扫描区域平面,或者扫描区域在一个弯曲的球面上等情况时,目标扫描区域边界特征通常会发生形变,在不做处理的情况下,扫描设备可能无法锁定目标扫描区域边界特征。因此,在一定的扫描角度范围内,可以通过纠错算法进行纠正,使得扫描设备依然可以锁定目标扫描区域边界特征。在可以通过纠错算法进行纠正时,当前扫描角度是满足要求的。When the scanning light does not have a vertical scanning area plane, or the scanning area is on a curved spherical surface, the boundary characteristics of the target scanning area are usually deformed, and the scanning device may not be able to lock the boundary feature of the target scanning area without processing. . Therefore, within a certain range of scanning angles, correction can be performed by an error correction algorithm, so that the scanning device can still lock the boundary features of the target scanning area. When the correction can be made by the error correction algorithm, the current scanning angle is satisfactory.
此时,步骤S202具体内容为:若当前扫描角度满足要求,则对锁定的所述目标扫描区域进行光学识别和纠正。At this time, the specific content of step S202 is: if the current scanning angle satisfies the requirement, optically recognize and correct the locked target scanning area.
在当前扫描角度满足要求时,对锁定的目标扫描区域一边进行光学识别,一边利用纠错算法就行纠正,以获得纠正后的识别信息。When the current scanning angle satisfies the requirement, the locked target scanning area is optically recognized while being corrected by the error correction algorithm to obtain the corrected identification information.
需要说明的是,如果在通过目标扫描区域边界特征锁定目标扫描区域时没有纠正目标扫描区域边界特征,即扫描设备自动通过目标扫描区域边界特征锁定目标扫描区域,这时在对目标扫描区域进行光学识别时,也可以根据实际情况对光学识别的结果进行纠正。It should be noted that if the target scanning area boundary feature is not corrected when the target scanning area is locked by the target scanning area boundary feature, that is, the scanning device automatically locks the target scanning area by the target scanning area boundary feature, then the target scanning area is optically When identifying, the result of optical recognition can also be corrected according to the actual situation.
其中,进行扫描的角度满足的要求是:角度大于等于第一阈值且小于等于第二阈值,角度是进行扫描的光线与目标扫描区域平面的夹角。The requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, and the angle is an angle between the scanned light and the plane of the target scanning area.
另外,第一阈值是75度,第二阈值是105度。In addition, the first threshold is 75 degrees and the second threshold is 105 degrees.
例如:如果定义的边界特征为矩形,倾斜扫描时,在移动设备上感知到的矩形发生变形,而这变形与倾斜角度成预定关系,利用这个预定关系和得到的变形度,即可获知倾斜角度。For example, if the defined boundary feature is a rectangle, when the oblique scan is performed, the rectangle sensed on the mobile device is deformed, and the deformation is in a predetermined relationship with the tilt angle, and the tilt angle is obtained by using the predetermined relationship and the obtained degree of deformation. .
如果进行扫描的角度过于倾斜,目标扫描区域的边界特征不容易识别,或识别错误,导致不能正确锁定目标扫描区域。If the angle of the scan is too oblique, the boundary features of the target scan area are not easily recognized, or an error is recognized, resulting in that the target scan area cannot be correctly locked.
在另一实施方式中,步骤S202之后,还包括:若锁定的目标扫描区域发生变形且变形在预定范围内,则利用纠错算法对光学识别后的目标扫描区域进行纠错与还原。In another embodiment, after step S202, the method further comprises: performing error correction and restoration on the optically recognized target scanning area by using an error correction algorithm if the locked target scanning area is deformed and deformed within a predetermined range.
例如,目标扫描区域是长方形的防伪标签,防伪标签贴在球面或弧形的杯子上,此时,目标扫描区域由于贴在球面或弧形的杯子上而发生变形,变成环形或弧形等,如果该变形在预定范围内,可以利用纠错算法对光学识别后的目标扫描区域进行纠错与还原。For example, the target scanning area is a rectangular anti-counterfeit label, and the anti-counterfeiting label is attached to a spherical or curved cup. At this time, the target scanning area is deformed by being attached to a spherical or curved cup, and becomes a ring or an arc. If the deformation is within a predetermined range, the error correction algorithm may be used to correct and restore the optically recognized target scanning area.
其中,目标扫描区域是防伪标签。防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。The target scanning area is an anti-counterfeit label. The anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。Anti-counterfeit labels, also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). Logo. The anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label. In the embodiment of the invention, the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
本发明实施方式在进行光学识别前,根据目标扫描区域边界特征锁定目标扫描区域;对锁定的目标扫描区域进行光学识别。由于在目标扫描区域设置了边界特征,通过这种方式,可以快速锁定目标扫描区域,可以快速扫描和识别,减少了扫描设备的负荷。In the embodiment of the present invention, before the optical recognition, the target scanning area is locked according to the boundary feature of the target scanning area; and the locked target scanning area is optically recognized. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, and the scanning and identification can be quickly performed, thereby reducing the load on the scanning device.
在步骤S102中,如果用移动设备采集位于物体之上的防伪标签的图像,那么这里也涉及到如下图所示的本发明防伪标签、与该防伪标签相关的防伪方法以及该防伪标签的制作方法。In step S102, if the image of the security label located on the object is collected by the mobile device, the anti-counterfeit label of the present invention shown in the following figure, the anti-counterfeiting method related to the anti-counterfeit label, and the manufacturing method of the anti-counterfeit label are also involved here. .
参阅图4,图4是本发明防伪标签一实施方式的结构示意图,如图所示,该防伪标签10包括基层101以及滴膜层102,滴膜层102是由包含多个粒子1021的胶体1022分散到基层101后,干燥固化形成的,其中,滴膜层102中的粒子1021至少其数量以及位置是随机的。Referring to FIG. 4, FIG. 4 is a schematic structural diagram of an anti-counterfeit label according to an embodiment of the present invention. As shown, the anti-counterfeit label 10 includes a base layer 101 and a drip layer 102. The drip layer 102 is composed of a colloid 1022 including a plurality of particles 1021. After being dispersed into the base layer 101, it is formed by drying and solidification, wherein at least the number and position of the particles 1021 in the drip film layer 102 are random.
防伪标签10又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。 Anti-counterfeit label 10, also known as anti-counterfeit label or anti-counterfeit trademark, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachment of the subject matter (such as merchandise listing, business card and security card), with anti-counterfeiting The identity of the role. The anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label.
本发明实施方式防伪标签中的滴膜层包含多个粒子,且粒子的数量和位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。In the embodiment of the invention, the drip film in the anti-counterfeit label comprises a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
参阅图5,图5是本发明防伪标签另一实施方式的结构示意图,如图所示,该防伪标签20包括基层201以及滴膜层202,滴膜层202是由包含多个粒子2021的胶体2022分散到基层201后,干燥固化形成的,其中,滴膜层202中的粒子2021至少其数量以及位置是随机的。Referring to FIG. 5, FIG. 5 is a schematic structural view of another embodiment of the anti-counterfeit label of the present invention. As shown, the anti-counterfeit label 20 includes a base layer 201 and a drip layer 202. The drip layer 202 is a colloid comprising a plurality of particles 2021. After 2022 is dispersed into the base layer 201, it is formed by drying and solidification, wherein at least the number and position of the particles 2021 in the drip film layer 202 are random.
基层201上印刷有坐标系2011,随机数量的粒子2021在坐标系2011中随机分布,一个滴膜层202在形成后其所有粒子2021的坐标首次记录,形成预定长度的坐标序列被记录于数据库中以待验证时查证真伪。通过在基层上印刷坐标系,可以增加防伪标签的防伪精度。The base layer 201 is printed with a coordinate system 2011, a random number of particles 2021 are randomly distributed in the coordinate system 2011, and a droplet layer 202 is first recorded after the formation of the coordinates of all the particles 2021 thereof, and a coordinate sequence forming a predetermined length is recorded in the database. Verify the authenticity when it is to be verified. By printing the coordinate system on the base layer, the anti-counterfeiting accuracy of the security label can be increased.
需要说明的是,在记录或识别粒子的坐标时,如果粒子的坐标不容易确定,可以忽略该粒子,也可以通过确定坐标的算法来确定该粒子的坐标。如果滴膜层中粒子的数量很多,粒子的坐标序列组合在一起后字符数多于预设字符数,则将预设字符数以后的字符忽略。It should be noted that, when recording or identifying the coordinates of a particle, if the coordinates of the particle are not easily determined, the particle may be ignored, or the coordinate of the particle may be determined by an algorithm for determining the coordinate. If the number of particles in the drip layer is large, and the number of characters of the particle is combined more than the preset number of characters, the characters after the preset number of characters are ignored.
其中,一个滴膜层202中的所有粒子2021颜色至少为一种,如果颜色是两种或两种以上,则颜色的分布也是随机的。如图5所示,有两种颜色的粒子,分别是红色的粒子20211和黄色的粒子20212。Wherein, all the particles 2021 in one drip film layer 202 have at least one color, and if the color is two or more, the color distribution is also random. As shown in FIG. 5, there are two color particles, which are red particles 20211 and yellow particles 20212, respectively.
其中,一种情况是粒子的直径位于0.1毫米至1毫米之间,例如0.1毫米、0.5毫米或1毫米,在这个范围内,普通的扫描设备可以分辨各个粒子;另一种情况是粒子的直径位于1微米至10微米之间,例如1微米、5微米或10微米,在这个范围内,普通的扫描设备无法分辨各个粒子,需要借助带有工具例如放大镜或者低倍显微镜的特殊扫描设备才能够分辨各个粒子。对防伪标签来说,如果需要借助带有工具的特殊扫描设备才可以分辨各个粒子,那么这无疑更加增加了伪造者仿冒的难度,进一步提高了防伪的可靠性。当然,在实际应用中,粒子的直径并不限于上述0.1毫米至1毫米和1微米至10微米范围之内,例如2毫米、50微米等等。One of the cases is that the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm. In this range, a common scanning device can distinguish individual particles; the other case is the diameter of the particles. Located between 1 micron and 10 micron, such as 1 micron, 5 micron or 10 micron, in this range, ordinary scanning devices cannot distinguish individual particles, and special scanning equipment with tools such as magnifying glasses or low power microscopes is required. Resolve individual particles. For anti-counterfeiting labels, if it is necessary to distinguish the individual particles by means of special scanning equipment with tools, this will undoubtedly increase the difficulty of counterfeiting counterfeiting and further improve the reliability of anti-counterfeiting. Of course, in practical applications, the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 μm, such as 2 mm, 50 μm, and the like.
需要说明的是,防伪标签中的胶体可以是透明的,也可以不是透明,如果不是透明的,对于粒子或扫面设备有特殊的要求,例如带有X光照射功能的扫描设备,或者粒子带有某种标记物,扫描设备是带有识别该标记物的扫描设备。It should be noted that the colloid in the anti-counterfeit label may be transparent or not transparent. If it is not transparent, it has special requirements for particles or scanning equipment, such as scanning equipment with X-ray irradiation function, or particle belt. There is some kind of marker, and the scanning device is a scanning device with the identification of the marker.
参阅图6和图7,在图6和图7中,防伪标签30还包括边界特征:第一矩形303和第二矩形304,第一矩形303和第二矩形304设置于基层301上,第一矩形303和第二矩形304所围成的区域即为目标扫描区域,即滴膜层302所覆盖的区域。Referring to FIG. 6 and FIG. 7, in FIG. 6 and FIG. 7, the security label 30 further includes a boundary feature: a first rectangle 303 and a second rectangle 304, and the first rectangle 303 and the second rectangle 304 are disposed on the base layer 301, first The area enclosed by the rectangle 303 and the second rectangle 304 is the target scanning area, that is, the area covered by the falling film layer 302.
通过边界特征第一矩形和第二矩形,可以快速锁定目标扫描区域,对于非目标扫描区域,可以不用采集数据,从而提高扫描和采集防伪标签的数据的速度,并减少扫描设备的负荷。The target scanning area can be quickly locked by the boundary feature first rectangle and the second rectangle. For the non-target scanning area, data can be collected without collecting data, thereby improving the speed of scanning and collecting the data of the security label and reducing the load of the scanning device.
需要说明的是,在实际应用中,边界特征除了上述的矩形外,还可以是其它指定的图形。另外,边界特征还可以采用其他的方式,例如在目标扫描区域的边界使用指定的颜色等,或者将目标扫描区域和非目标扫描区域分别采用不同的色彩,使得目标扫描区域和非目标扫描区域形成明显的边界特征。It should be noted that, in practical applications, the boundary features may be other specified graphics in addition to the rectangles described above. In addition, the boundary feature may also adopt other manners, such as using a specified color or the like at the boundary of the target scanning area, or adopting different colors for the target scanning area and the non-target scanning area, respectively, so that the target scanning area and the non-target scanning area are formed. Obvious boundary features.
需要说明的是,上述图4至图7中的防伪标签还可以包括覆盖在基层以及滴膜层最上面的涂层,该涂层将防伪标签的防伪信息覆盖,以保护防伪信息的暴露,在需要扫描防伪标签的防伪信息的时候,将涂层刮掉即可。It should be noted that the anti-counterfeit label in the above FIG. 4 to FIG. 7 may further include a coating covering the base layer and the uppermost layer of the drip film layer, and the coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information. When you need to scan the anti-counterfeiting information of the anti-counterfeit label, scrape off the coating.
参阅图8,图8是本发明防伪方法另一实施方式的流程图,本实施方式是在防伪标签是图4至图7所述的防伪标签时防伪方法的流程图,包括:Referring to FIG. 8 , FIG. 8 is a flowchart of another embodiment of the anti-counterfeiting method of the present invention. The embodiment is a flowchart of an anti-counterfeiting method when the anti-counterfeit tag is the anti-counterfeit tag described in FIG. 4 to FIG. 7 , and includes:
步骤S301:扫描并采集防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。Step S301: Scan and collect an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer are at least The quantity and location are random.
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。Anti-counterfeit labels, also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). Logo. The anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label. In the embodiment of the invention, the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
其中,扫描并采集防伪标签的图像的步骤包括:在采集防伪标签的图像之前,根据目标扫描区域边界特征锁定目标扫描区域;对锁定的目标扫描区域采集防伪标签的图像。The step of scanning and collecting the image of the security label includes: before acquiring the image of the security label, locking the target scanning area according to the boundary feature of the target scanning area; and collecting the image of the security label for the locked target scanning area.
目标扫描区域边界特征是指可以锁定目标扫描区域的边界特征,例如,在目标扫描区域的边界使用指定的颜色、指定的图形等,或者将目标扫描区域和非目标扫描区域分别采用不同的色彩,使得目标扫描区域和非目标扫描区域形成明显的边界特征。The target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively. The target scan area and the non-target scan area are made to form a distinct boundary feature.
具体来说,边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。例如,目标扫描区域外(即非目标扫描区域)使用黑色的颜色,目标扫描区域使用白色的颜色,据此两种颜色之间的差异即可很快获得边界特征。Specifically, the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area. For example, the out-of-target scan area (ie, the non-target scan area) uses a black color, and the target scan area uses a white color, and the boundary feature can be quickly obtained based on the difference between the two colors.
另外,边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。例如:在目标扫描区域的两边设置边界特征:两个矩形,两个矩形的宽度和两个矩形之间的距离所围成的区域即为目标扫描区域;或在目标扫描区域的边界设置指定的色彩,如红色,红色所围成的区域即为目标扫描区域。In addition, the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area. For example, the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area. The area enclosed by colors such as red and red is the target scanning area.
比如,如果在锁定目标扫描区域的过程中,如果移动设备的屏幕上目标扫描区域周围显示不闪烁的绿框,则表示目标扫描区域锁定成功;如果正在锁定目标扫描区域,则可以显示闪烁的绿框;如果锁定目标扫描区域失败,则显示红框或不显示颜色框。For example, if a green frame that does not blink is displayed around the target scanning area on the screen of the mobile device during the locking of the target scanning area, the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
通过目标扫描区域的边界特征,可以快速锁定目标扫描区域,从而可以提高扫描识别的速度,减少移动设备在进行识别时的负载。Through the boundary feature of the target scanning area, the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
步骤S302:识别滴膜层中的粒子的数量以及位置而得到验证数据。Step S302: Identifying the number and position of the particles in the drip layer to obtain verification data.
步骤S302具体包括:识别滴膜层中的粒子的数量、位置以及颜色,其中,滴膜层中的所有粒子颜色至少为一种,如果颜色有两种或两种以上,则颜色的分布也是随机的。The step S302 specifically includes: identifying the number, position, and color of the particles in the drip layer, wherein all the particles in the drip layer have at least one color, and if there are two or more colors, the color distribution is also random. of.
在粒子的数量和位置是随机分布的情况下,增加粒子的颜色,并且颜色的分布也是随机的,通过这种方式,更加增加了仿造防伪标签的难度,提高了防伪标签的可靠性。In the case where the number and position of the particles are randomly distributed, the color of the particles is increased, and the distribution of the colors is also random. In this way, the difficulty of counterfeiting the security label is further increased, and the reliability of the security label is improved.
其中,步骤S302具体还可以包括如下内容:The step S302 may specifically include the following content:
C1:将识别出来的滴膜层中的粒子的数量、位置按顺序组合成第一数据。C1: The number and position of the particles in the identified drip layer are sequentially combined into the first data.
C2:将识别第一数据时所产生的移动设备的号码中预定位数的号码、国际移动用户识别码IMSI中预定位数的代码、国际移动设备识别码IMEI中预定位数的代码中的一种组合成第二数据。C2: one of a predetermined number of digits in the number of the mobile device generated when the first data is to be identified, a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), and a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI The two are combined into the second data.
或者C2:将识别第一数据时所产生的至少包括时间数据以及地点数据按顺序组合成第二数据。Or C2: at least the time data and the location data generated when the first data is identified are sequentially combined into the second data.
C3:将第一数据和第二数据按顺序组合成最后的验证数据。C3: The first data and the second data are sequentially combined into the final verification data.
由于粒子的数量和位置是随机分布的,第一数据基本代表了防伪标签的唯一性,如果第二数据是识别第一数据时所产生的移动设备的号码中预定位数的号码、国际移动用户识别码IMSI中预定位数的代码、国际移动设备识别码IMEI中预定位数的代码中的一种组合生成的,这又进一步增加了验证数据的唯一性,提高防伪的可靠性。如果第二数据是识别第一数据时所产生的至少包括时间数据以及地点数据按顺序组合成的,这也进一步增加了验证数据的唯一性,提高防伪的可靠性。Since the number and position of the particles are randomly distributed, the first data basically represents the uniqueness of the security label, if the second data is a predetermined number of digits in the number of the mobile device generated when the first data is identified, the international mobile user The combination of the code of the predetermined number of bits in the identification code IMSI and the code of the predetermined number of bits in the international mobile device identification code IMEI further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting. If the second data is generated by identifying at least the time data and the location data is sequentially combined, this further increases the uniqueness of the verification data and improves the reliability of the anti-counterfeiting.
步骤S303:在数据库中查找匹配验证数据的正确结果,若能够查找得到匹配的正确结果,则判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是滴膜层中的所有粒子的坐标在分散后,形成预定长度的坐标序列作为正确结果被记录于数据库中以待验证时查证真伪。Step S303: Find the correct result of the matching verification data in the database. If the correct result of the matching is found, it is determined that the anti-counterfeit label is a real label, otherwise it is determined to be a false label, wherein the correct result is all the particles in the falling layer After the coordinates are dispersed, a coordinate sequence of a predetermined length is formed as a correct result to be recorded in the database to verify the authenticity when to be verified.
滴膜层中的所有粒子的坐标在分散后,形成预定长度的坐标序列作为正确结果被记录于数据库中,验证数据是识别滴膜层中的粒子的数量以及位置而得到,因此,在数据库中能够找到匹配验证数据的,则防伪标签是真实标签,否则为虚假标签。如果验证数据包括第一数据和第二数据在内的组合数据,根据第一数据查找匹配验证数据的正确结果,如果能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签。After the coordinates of all the particles in the drip layer are dispersed, a coordinate sequence forming a predetermined length is recorded as a correct result in the database, and the verification data is obtained by identifying the number and position of the particles in the drip layer, and thus, in the database If the matching verification data can be found, the anti-counterfeit label is a real label, otherwise it is a fake label. If the verification data includes the combined data of the first data and the second data, and the correct result of the matching verification data is searched according to the first data, if the correct result of the matching is found, the authentication result is determined that the security label is a real label, Otherwise it is judged to be a false label.
本发明实施方式扫描并采集防伪标签的图像,识别滴膜层中的粒子的数量以及位置而得到验证数据;在数据库中查找匹配所述验证数据的正确结果。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。Embodiments of the present invention scan and collect images of security labels, identify the number and location of particles in the drop layer to obtain verification data, and find the correct results in the database that match the verification data. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
参阅图9,图9是本发明防伪标签制造方法一实施方式的流程图,包括:Referring to FIG. 9, FIG. 9 is a flowchart of an embodiment of a method for manufacturing an anti-counterfeit label according to the present invention, including:
步骤S401:将多个粒子加入到胶体中。Step S401: adding a plurality of particles to the colloid.
此处的粒子的材料包括但不限于塑料、金属、陶瓷等等,在此不做限制。胶体又称胶状分散体,是一种分散质粒子直径介于粗分散体系和溶液之间的一类分散体系,可以是透明的,也可以是非透明的,不做限制。The materials of the particles herein include, but are not limited to, plastics, metals, ceramics, and the like, and are not limited herein. Colloid, also known as colloidal dispersion, is a type of dispersion system in which the diameter of the dispersed particles is between the crude dispersion system and the solution. It may be transparent or non-transparent, and is not limited.
其中,步骤S401包括:将多个粒子加入到透明胶体中并搅拌。Wherein, step S401 comprises: adding a plurality of particles to the transparent colloid and stirring.
步骤S402:将含有粒子的胶体分散到基层上,形成含有粒子的薄膜。Step S402: Dispersing the colloid containing the particles onto the base layer to form a film containing the particles.
其中,将含有粒子的胶体分散到基层上的步骤包括:将含有粒子的胶体滴落、添加或喷洒到基层上。Wherein, the step of dispersing the colloid containing the particles onto the base layer comprises: dropping, adding or spraying the colloid containing the particles onto the base layer.
其中,形成含有粒子的薄膜的步骤之前包括:在基层表面印刷坐标系,薄膜位于印刷坐标系中,其中,随机数量的粒子在坐标系中随机分布。Wherein, the step of forming the film containing the particles comprises: printing a coordinate system on the surface of the substrate, the film being in a printing coordinate system, wherein a random number of particles are randomly distributed in the coordinate system.
在基层表面印刷坐标系可以更好的标识随机数量的粒子的随机位置坐标,提高防伪标签的防伪精度。Printing the coordinate system on the surface of the base layer can better identify the random position coordinates of a random number of particles, and improve the anti-counterfeiting precision of the anti-counterfeit label.
其中,在基层表面印刷坐标系的步骤包括:在基层表面印刷坐标系、边界特征:第一矩形以及第二矩形,其中,第一矩形和第二矩形所围成的区域即为目标扫描区域,即滴膜层所覆盖的区域。The step of printing a coordinate system on the surface of the base layer includes: printing a coordinate system and a boundary feature on the surface of the base layer: a first rectangle and a second rectangle, wherein the area enclosed by the first rectangle and the second rectangle is the target scanning area. That is, the area covered by the drip film layer.
通过边界特征第一矩形和第二矩形,可以快速锁定目标扫描区域,对于非目标扫描区域,可以不用采集数据,从而提高扫描和采集防伪标签的数据的速度,并减少扫描设备的负荷。The target scanning area can be quickly locked by the boundary feature first rectangle and the second rectangle. For the non-target scanning area, data can be collected without collecting data, thereby improving the speed of scanning and collecting the data of the security label and reducing the load of the scanning device.
需要说明的是,在实际应用中,边界特征除了上述的矩形外,还可以是其它指定的图形。另外,边界特征还可以采用其他的方式,例如在目标扫描区域的边界使用指定的颜色等,或者将目标扫描区域和非目标扫描区域分别采用不同的色彩,使得目标扫描区域和非目标扫描区域形成明显的边界特征。It should be noted that, in practical applications, the boundary features may be other specified graphics in addition to the rectangles described above. In addition, the boundary feature may also adopt other manners, such as using a specified color or the like at the boundary of the target scanning area, or adopting different colors for the target scanning area and the non-target scanning area, respectively, so that the target scanning area and the non-target scanning area are formed. Obvious boundary features.
步骤S403:使薄膜干燥固化,其中,薄膜中的粒子至少其数量以及位置是随机的。Step S403: The film is dried and solidified, wherein at least the number and position of the particles in the film are random.
其中,步骤S403之后还包括:Wherein, after step S403, the method further includes:
D1:记录薄膜中全部或预定数量粒子的坐标,得到预定长度的坐标序列,并记录于数据库中以待验证时查证真伪。D1: Record the coordinates of all or a predetermined number of particles in the film, obtain a coordinate sequence of a predetermined length, and record it in a database to verify the authenticity when it is to be verified.
D2:在基层以及滴膜层最上面覆盖涂层。该涂层将防伪标签的防伪信息覆盖,以保护防伪信息的暴露,在需要扫描防伪标签的防伪信息的时候,将涂层刮掉即可。D2: The coating is covered on the base layer and at the top of the drip layer. The coating covers the anti-counterfeiting information of the anti-counterfeit label to protect the exposure of the anti-counterfeiting information. When the anti-counterfeiting information of the anti-counterfeit label needs to be scanned, the coating may be scraped off.
在本发明实施方式中,一种情况是粒子的直径位于0.1毫米至1毫米之间,例如0.1毫米、0.5毫米或1毫米,在这个范围内,普通的扫描设备可以分辨各个粒子;另一种情况是粒子的直径位于1微米至10微米之间,例如1微米、5微米或10微米,在这个范围内,普通的扫描设备无法分辨各个粒子,需要借助带有工具例如放大镜或者低倍显微镜的特殊扫描设备才能够分辨各个粒子。对防伪标签来说,如果需要借助带有工具的特殊扫描设备才可以分辨各个粒子,那么这无疑更加增加了伪造者仿冒的难度,进一步提高了防伪的可靠性。当然,在实际应用中,粒子的直径并不限于上述0.1毫米至1毫米和1微米至10微米范围之内,例如2毫米、50微米等等。In an embodiment of the invention, a condition is that the diameter of the particles is between 0.1 mm and 1 mm, such as 0.1 mm, 0.5 mm or 1 mm, within which a conventional scanning device can resolve individual particles; In the case where the diameter of the particles is between 1 micrometer and 10 micrometers, for example 1 micrometer, 5 micrometers or 10 micrometers, in this range, ordinary scanning devices cannot distinguish individual particles, and need to use tools such as a magnifying glass or a low power microscope. Special scanning equipment is able to distinguish individual particles. For anti-counterfeiting labels, if it is necessary to distinguish the individual particles by means of special scanning equipment with tools, this will undoubtedly increase the difficulty of counterfeiting counterfeiting and further improve the reliability of anti-counterfeiting. Of course, in practical applications, the diameter of the particles is not limited to the above 0.1 mm to 1 mm and 1 to 10 μm, such as 2 mm, 50 μm, and the like.
本发明实施方式将多个粒子加入到胶体中;将含有粒子的胶体分散到基层上,形成含有粒子的薄膜;使薄膜干燥固化,其中,薄膜中的粒子至少其数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。Embodiments of the present invention add a plurality of particles to a colloid; disperse the colloid containing the particles onto the base layer to form a film containing the particles; and dry and solidify the film, wherein at least the number and position of the particles in the film are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
在图1的防伪方法实施方式中,如果防伪信息是带有滴胶的防伪标签,则防伪方法如图10所示。In the anti-counterfeiting method embodiment of FIG. 1, if the anti-counterfeiting information is an anti-counterfeit label with Epoxy, the anti-counterfeiting method is as shown in FIG.
参见图10,图10是本发明防伪方法又一实施方式的流程图,包括:Referring to FIG. 10, FIG. 10 is a flowchart of still another embodiment of the anti-counterfeiting method of the present invention, including:
步骤S501:将唯一标识相应物体的第一数据保存在鉴别服务器中。Step S501: The first data that uniquely identifies the corresponding object is saved in the authentication server.
唯一标识相应物体的第一数据即为该物体的防伪信息。由于第一数据的唯一性,根据第一数据可以辨别该物体的真假。The first data that uniquely identifies the corresponding object is the anti-counterfeiting information of the object. Due to the uniqueness of the first data, the authenticity of the object can be discriminated based on the first data.
步骤S502:移动设备扫描并采集防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。Step S502: The mobile device scans and collects an image of the security label, wherein the anti-counterfeit label includes a base layer and a drip layer, and the drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying, and the particles in the drip layer At least its number and location are random.
防伪标签又称为防伪标识或防伪商标,是能粘贴、印刷、转移在标的物表面,或标的物包装上,或标的物附属物(如商品挂牌、名片以及防伪证卡)上,具有防伪作用的标识。防伪标签的防伪特征以及识别的方法是防伪标签的灵魂。本发明实施方式中,防伪标签的滴膜层中包含多个粒子,粒子的数量以及位置是随机的。因为粒子的数量和位置是随机的,因此防伪标签很难以被复制,大大提高了防伪的可靠性,有效防止产品的假冒伪造。Anti-counterfeit labels, also known as anti-counterfeiting labels or anti-counterfeiting labels, can be pasted, printed, transferred on the surface of the subject matter, or on the label of the subject matter, or on the attachments of the subject matter (such as commodity listings, business cards, and security cards). Logo. The anti-counterfeiting feature of the anti-counterfeit label and the method of identification are the soul of the anti-counterfeit label. In the embodiment of the invention, the droplet layer of the anti-counterfeit label contains a plurality of particles, and the number and position of the particles are random. Because the number and position of particles are random, anti-counterfeit labels are difficult to be copied, which greatly improves the reliability of anti-counterfeiting and effectively prevents counterfeiting of products.
步骤S502包括:在采集防伪标签的图像之前,根据目标扫描区域边界特征锁定目标扫描区域;对锁定的目标扫描区域采集防伪标签的图像。Step S502 includes: before acquiring the image of the security label, locking the target scanning area according to the boundary feature of the target scanning area; and collecting the image of the security label for the locked target scanning area.
目标扫描区域边界特征是指可以锁定目标扫描区域的边界特征,例如,在目标扫描区域的边界使用指定的颜色、指定的图形等,或者将目标扫描区域和非目标扫描区域分别采用不同的色彩,使得目标扫描区域和非目标扫描区域形成明显的边界特征。The target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively. The target scan area and the non-target scan area are made to form a distinct boundary feature.
具体来说,边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。例如,目标扫描区域外(即非目标扫描区域)使用黑色的颜色,目标扫描区域使用白色的颜色,据此两种颜色之间的差异即可很快获得边界特征。Specifically, the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area. For example, the out-of-target scan area (ie, the non-target scan area) uses a black color, and the target scan area uses a white color, and the boundary feature can be quickly obtained based on the difference between the two colors.
另外,边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。例如:在目标扫描区域的两边设置边界特征:两个矩形,两个矩形的宽度和两个矩形之间的距离所围成的区域即为目标扫描区域;或在目标扫描区域的边界设置指定的色彩,如红色,红色所围成的区域即为目标扫描区域。In addition, the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area. For example, the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area. The area enclosed by colors such as red and red is the target scanning area.
比如,如果在锁定目标扫描区域的过程中,如果移动设备的屏幕上目标扫描区域周围显示不闪烁的绿框,则表示目标扫描区域锁定成功;如果正在锁定目标扫描区域,则可以显示闪烁的绿框;如果锁定目标扫描区域失败,则显示红框或不显示颜色框。For example, if a green frame that does not blink is displayed around the target scanning area on the screen of the mobile device during the locking of the target scanning area, the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
通过目标扫描区域的边界特征,可以快速锁定目标扫描区域,从而可以提高扫描识别的速度,减少移动设备在进行识别时的负载。Through the boundary feature of the target scanning area, the target scanning area can be quickly locked, thereby improving the speed of scanning recognition and reducing the load of the mobile device when identifying.
步骤S503:识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。Step S503: Identify the number and position of the particles in the drip layer, and combine the number and position of the particles in the identified drip layer into the first data in order.
利用预定的规则对第一数据的格式进行定义,例如,第一数据要求是10个字符,如果规定坐标的位数是两位时,默认规定仅体现5个粒子的信息,字符不够的位数以零来补充,在滴膜层中有两个粒子,位置坐标分别是(0,2)和(5,3),按照横坐标由小到大的方向组合为0253(规定坐标的位数是两位)或00020503(规定坐标的位数是四位),则第一数据为0253000000或0002050300;按照纵坐标有大到小的方向组合为5302(规定坐标的位数是两位)或05030002(规定坐标的位数是四位),则第一数据为5302000000或0503000200。如果滴膜层中粒子的数量很多,粒子的位置坐标组合在一起后字符数多于10,则将10个字符以后的字符忽略,不计入第一数据中。当然,在实际应用中,第一数据的格式的规则的制定并不限于上述方式,在此不做限制。The format of the first data is defined by a predetermined rule. For example, the first data requirement is 10 characters. If the number of bits of the specified coordinates is two digits, the default specifies that only five pieces of information are represented, and the number of characters is insufficient. Supplemented by zero, there are two particles in the drip layer, the position coordinates are (0, 2) and (5, 3), respectively, combined in the direction of the abscissa from small to large to 0253 (the number of bits of the specified coordinates is Two) or 00020503 (the number of bits in the specified coordinates is four), then the first data is 0253000000 or 0002050300; the direction in which the ordinate is large to small is 5302 (the number of bits of the specified coordinates is two) or 05030002 ( The number of bits for the specified coordinates is four bits, and the first data is 5302000000 or 0503000200. If the number of particles in the drip layer is large, and the position coordinates of the particles are combined and the number of characters is more than 10, the characters after 10 characters are ignored and are not included in the first data. Of course, in practical applications, the rule of the format of the first data is not limited to the above manner, and is not limited herein.
步骤S503具体包括:识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果粒子颜色为两种或两种以上,则颜色的分布也是随机的。Step S503 specifically includes: identifying the number, position, and color of the particles in the drip layer, and sequentially combining the number, position, and color of the particles in the identified drip layer into the first data, wherein the drip layer is The color of all particles is at least one. If the color of the particles is two or more, the distribution of colors is also random.
例如红色是01,黄色是02,黑色是03,绿色是04等等,如果上述的两个粒子一个是红色,一个是绿色,那么按照横坐标由小到大的方向且颜色有大到小的顺序进行排列组合,第一数据为0253010400(规定坐标的位数是两位)或者000205030104(规定坐标的位数是四位)。For example, red is 01, yellow is 02, black is 03, green is 04, etc. If the above two particles are red and one is green, then the direction from small to large and the color is large to small. The order is combined and arranged, the first data is 0253010400 (the number of bits of the specified coordinates is two bits) or the 000205030104 (the number of bits of the specified coordinates is four bits).
步骤S504:在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。Step S504: After acquiring the first data, the mobile device locally generates second data, where the second data includes unique data associated with the local device of the mobile device.
其中,第二数据是移动设备的号码中预定位数的号码,或者是国际移动用户识别码中预定位数的代码IMSI,或者是国际移动设备识别码IMEI中预定位数的代码。The second data is a number of predetermined digits in the number of the mobile device, or a code IMSI of a predetermined number of bits in the International Mobile Subscriber Identity, or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
移动用户的号码、国际移动用户识别码IMSI以及国际移动设备识别码IMEI对每个移动设备来说都是与移动设备本机关联的唯一性数据。为了保护移动用户的隐私,防止移动用户号码的泄密,第二数据包括移动设备的号码中预定位数的号码、或国际移动用户识别码IMSI中预定位数的代码或国际移动设备识别码IMEI中预定位数的代码,这样既可以获得移动设备唯一性的数据,又可以保护用户的隐私。例如,移动设备的号码是13777778888,预定后面的6位,则第二数据是778888。The mobile subscriber's number, the International Mobile Subscriber Identity (IMSI), and the International Mobile Equipment Identity IMEI are unique data associated with the mobile device's native to each mobile device. In order to protect the privacy of the mobile subscriber from the disclosure of the mobile subscriber number, the second data comprises a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI) or the International Mobile Equipment Identity IMEI The code for the predetermined number of bits, so that both the uniqueness of the mobile device data and the privacy of the user can be protected. For example, the number of the mobile device is 13777778888, and the next 6 digits are reserved, and the second data is 778888.
或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。Alternatively, the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
移动设备本机扫描的时间数据和移动设备本机扫描的地点数据都是与移动设备本机关联的唯一性数据,因此,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或移动设备本机扫描的时间数据和扫描的地点数据的组合数据。例如,扫描的时间是2013年5月20日10点15分,地点是北京,第二数据可以是移动设备本机扫描的时间数据1305201015,或第二数据可以是移动设备本机扫描的地点数据beijing,如果第二数据是移动设备本机扫描的时间数据和扫描的地点数据的组合数据,那么第二数据是1305201015beijing。The time data scanned by the mobile device and the location data scanned by the mobile device are both unique data associated with the local device of the mobile device. Therefore, the second data may also be time data scanned by the mobile device or moved. The location data scanned by the device itself, or the combined data of the time data scanned by the mobile device and the scanned location data. For example, the scanning time is 10:15 on May 20, 2013, the location is Beijing, the second data may be the time data 1305201015 scanned by the mobile device, or the second data may be the location data scanned by the mobile device. Beijing, if the second data is the combined data of the time data scanned by the mobile device and the scanned location data, then the second data is 1305201015beijing.
需要说明的是,如果移动设备具备全球定位系统GPS导航功能,则移动设备本机扫描的地点是GPS定位导航的地点,如果移动设备不具备GPS导航功能或者没有开启GPS导航功能,则移动设备本机扫描的地点是该移动设备的号码归属地的地点。It should be noted that if the mobile device has the GPS navigation function of the global positioning system, the location scanned by the mobile device is the location of the GPS positioning navigation. If the mobile device does not have the GPS navigation function or does not enable the GPS navigation function, the mobile device The location scanned by the machine is the location where the number of the mobile device belongs.
当然,在实际应用中,也可以将移动设备的号码中预定位数号码、国际移动用户识别码IMSI中预定位数的代码或国际移动设备识别码IMEI中预定位数的代码与移动设备本机扫描的时间数据、移动设备本机扫描的地点数据、或移动设备本机扫描的时间数据和扫描的地点数据的组合数据进行组合以获得第二数据,在此不做限制。Of course, in practical applications, the predetermined number of digits in the number of the mobile device, the code of the predetermined number of bits in the International Mobile Subscriber Identity (IMSI) or the predetermined number of bits in the International Mobile Equipment Identity (IMEI) may be associated with the mobile device. The combined time data of the scanned time data, the location data scanned by the mobile device, or the combined time data of the mobile device and the scanned location data are combined to obtain the second data, which is not limited herein.
步骤S505:移动设备向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。Step S505: The mobile device sends verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct The results are recorded in the database to verify the authenticity when verification is required.
验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,所谓映射数据是指与第一数据和第二数据对应的另外一组数据,例如:第一数据是1234,第二数据是5678,第一数据的映射数据ABCD和第二数据的映射数据是EFGH,那么第一数据和第二数据组合在一起的映射数据是ABCDEFGH。如果验证数据是第一数据和第二数据组合在一起的映射数据,在验证服务器中可以将该映射数据反映射重新获得第一数据和第二数据。当然,在实际应用中,如果第一数据的映射数据和第二数据的映射数据也分别是唯一的,那么也可以以第一数据的映射数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果。The verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, and the mapping data refers to another set of data corresponding to the first data and the second data, For example, the first data is 1234, the second data is 5678, the mapping data ABCD of the first data and the mapping data of the second data are EFGH, and the mapping data in which the first data and the second data are combined is ABCDEFGH. If the verification data is mapping data in which the first data and the second data are combined, the mapping data may be back-mapped in the verification server to obtain the first data and the second data. Of course, in practical applications, if the mapping data of the first data and the mapping data of the second data are also unique, respectively, the correct result of matching the verification data may be searched in the authentication server by using the mapping data of the first data, and then The identification result is obtained.
移动设备向鉴别服务器发送验证数据,鉴别服务器根据第一数据查找匹配验证数据的正确结果,如果能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。The mobile device sends the verification data to the authentication server, and the authentication server searches for the correct result of the matching verification data according to the first data. If the correct result of the matching is found, the authentication result is determined that the security label is a real label, otherwise the virtual label is determined as a false label. Among them, the correct result is that the first data is recorded as a correct result in the database to verify the authenticity when it is to be verified.
步骤S506:移动设备接收来自鉴别服务器的鉴别结果。Step S506: The mobile device receives the authentication result from the authentication server.
当鉴别服务器获得鉴别结果后,将该鉴别结果向移动设备发送,移动设备接收来自鉴别服务器的鉴别结果。例如,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据一致时,鉴别服务器向移动设备返回鉴别结果为真实标签,并返回本次的第一数据和第二数据,当移动设备发送的验证数据中的第一数据和鉴别服务器保存的第一数据不一致时,鉴别服务器向移动设备返回鉴别结果为非真实标签,并返回本次的第一数据和第二数据,例如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888,当验证结果为真实标签,返回验证结果时附上本次获得的第一数据0121548498和第二数据788888,当验证结果为非真实标签,返回验证结果时也附上本次获得的第一数据0121548498和第二数据788888。After the authentication server obtains the authentication result, the authentication result is sent to the mobile device, and the mobile device receives the authentication result from the authentication server. For example, when the first data in the verification data sent by the mobile device is consistent with the first data saved by the authentication server, the authentication server returns the authentication result to the mobile device as a real label, and returns the current first data and the second data. When the first data in the verification data sent by the mobile device is inconsistent with the first data saved by the authentication server, the authentication server returns the authentication result to the mobile device as a non-authentic label, and returns the current first data and the second data, for example, The second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888. When the verification result is a real label, when the verification result is returned, the first data obtained this time is attached 01021548498. And the second data 788888, when the verification result is a non-real label, the first data 0121548498 and the second data 788888 obtained this time are also attached when the verification result is returned.
或者,鉴别服务器可以将第一次的验证数据保存在鉴别服务器中,在向移动设备发送鉴别结果的时候,将第一次验证保存的与该第一数据对应的验证数据中的第二数据或者第二数据的映射数据也向移动设备发送,如果没有保存的与该第一数据对应的验证数据,则不发送本次与该第一数据对应的验证数据的第二数据或者第二数据的映射数据。在鉴别结果是真实标签时,如果移动设备没有收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品是第一次验证,如果移动设备收到来自鉴别服务器的第二数据或者第二数据的映射数据,说明该防伪信息对应的产品不是第一次验证,曾经验证过。例如,移动设备本机本次获得的第二数据是1305301305beijing,来自鉴别服务器的第二数据是1305201015beijing,表明在2013年5月20日10点15分钟在北京已经有人验证过该产品,也可以说明该产品曾经被人使用过。又如,第二数据是移动设备号码的后六位数据,且移动设备本机本次获得的第二数据是788888时,如果鉴别服务器没有发送第二数据,表明该产品是第一次验证;如果鉴别服务器发送的第二数据是788888,表明用户使用该移动设备对该产品进行第二次验证;如果鉴别服务器发送的第二数据是785512,表明该产品在另外的移动设备上进行第二次验证,或者该产品曾经验证过,或该产品被人使用过。Alternatively, the authentication server may save the first verification data in the authentication server, and when transmitting the authentication result to the mobile device, verify the second data in the verification data corresponding to the first data that is saved for the first time or The mapping data of the second data is also sent to the mobile device, and if there is no saved verification data corresponding to the first data, the mapping of the second data or the second data of the verification data corresponding to the first data is not transmitted. data. When the authentication result is a real label, if the mobile device does not receive the mapping data of the second data or the second data from the authentication server, it indicates that the product corresponding to the anti-counterfeiting information is the first verification, if the mobile device receives the authentication server. The second data or the mapping data of the second data indicates that the product corresponding to the anti-counterfeiting information is not the first verification, and has been verified. For example, the second data obtained by the mobile device itself is 1305301305beijing, and the second data from the authentication server is 1305201015beijing, indicating that the product has been verified in Beijing at 10:15 on May 20, 2013. This product has been used by people. For another example, if the second data is the last six digits of the mobile device number, and the second data obtained by the mobile device itself is 788888, if the authentication server does not send the second data, it indicates that the product is the first verification; If the second data sent by the authentication server is 788888, it indicates that the user uses the mobile device to perform the second verification on the product; if the second data sent by the authentication server is 785512, the product is performed on the other mobile device for the second time. Verification, or the product has been verified, or the product has been used.
当然,鉴别服务器以什么样的方式向移动设备发送鉴别结果,在实际应用中,可以根据实际情况进行确定,并不限于上述方式,在此不做限制。Of course, the authentication server sends the authentication result to the mobile device. In the actual application, the authentication may be determined according to the actual situation, and is not limited to the foregoing manner, and is not limited herein.
本发明实施方式移动设备扫描并采集防伪标签的图像,识别所述滴膜层中的粒子的数量以及位置,并将所述识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据都是唯一性的数据,特别是第一数据,通过上述方式,可以确保验证数据的唯一性,从而提高防伪的可靠性。In the embodiment of the present invention, the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence. a data; the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
参阅图11,图11是本发明移动设备一实施方式的结构示意图,该移动设备包括:扫描采集模块11、第一数据获得模块12、第二数据获得模块13、发送模块14以及接收模块15。Referring to FIG. 11 , FIG. 11 is a schematic structural diagram of an embodiment of a mobile device according to the present invention. The mobile device includes: a scan acquisition module 11 , a first data obtaining module 12 , a second data obtaining module 13 , a sending module 14 , and a receiving module 15 .
需要说明的是,本实施方式的移动设备可以执行图10所示方法流程中所有的步骤。It should be noted that the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG.
扫描采集模块11用于扫描并采集防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。The scan acquisition module 11 is configured to scan and collect an image of the security label. The anti-counterfeit label includes a base layer and a drip layer. The drip layer is formed by dispersing a colloid containing a plurality of particles into the base layer, and drying and solidifying. At least the number and location of the particles are random.
其中,扫描采集模块11还用于在采集防伪标签的图像之前,根据目标扫描区域边界特征锁定目标扫描区域;对锁定的目标扫描区域采集防伪标签的图像。The scan acquisition module 11 is further configured to: before acquiring the image of the security label, lock the target scan area according to the boundary feature of the target scan area; and collect an image of the security label for the locked target scan area.
第一数据获得模块12用于识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。The first data obtaining module 12 is configured to identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
第一数据获得模块12具体用于识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果颜色为两种或两种以上,则颜色的分布也是随机的。The first data obtaining module 12 is specifically configured to identify the number, position, and color of the particles in the drip layer, and combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
第二数据获得模块13用于在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。The second data obtaining module 13 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
第二数据可以是移动设备的号码中预定位数的号码,或者是国际移动用户识别码IMSI中预定位数的代码,或者是国际移动设备识别码IMEI中预定位数的代码。The second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or a code of a predetermined number of bits in the International Mobile Equipment Identity IMEI.
或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。Alternatively, the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
发送模块14用于向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。The sending module 14 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct The results are recorded in the database to verify the authenticity when verification is required.
接收模块15用于接收来自鉴别服务器的鉴别结果。The receiving module 15 is configured to receive the authentication result from the authentication server.
本发明实施方式移动设备扫描并采集防伪标签的图像,识别所述滴膜层中的粒子的数量以及位置,并将所述识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据都是唯一性的数据,特别是第一数据,通过上述方式,可以确保验证数据的唯一性,从而提高防伪的可靠性。In the embodiment of the present invention, the mobile device scans and collects an image of the anti-counterfeit label, identifies the number and position of the particles in the drip layer, and combines the number and position of the particles in the identified drip layer into a sequence. a data; the mobile device locally generates second data after acquiring the first data; the mobile device transmits verification data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are both unique data, in particular the first data, in the above manner, the uniqueness of the verification data can be ensured, thereby improving the reliability of the anti-counterfeiting.
参阅图12,图12是本发明移动设备另一实施方式的结构示意图,移动设备包括:第一数据获得模块21、第二数据获得模块22、发送模块23以及接收模块24。Referring to FIG. 12, FIG. 12 is a schematic structural diagram of another embodiment of a mobile device according to the present invention. The mobile device includes: a first data obtaining module 21, a second data obtaining module 22, a sending module 23, and a receiving module 24.
需要说明的是,本实施方式的移动设备可以执行图1所示方法流程中的步骤S102至步骤S105。It should be noted that the mobile device of this embodiment may perform step S102 to step S105 in the method flow shown in FIG. 1 .
第一数据获得模块21用于获取对防伪信息进行识别而得到的第一数据,第一数据用以唯一标识相应物体。The first data obtaining module 21 is configured to acquire first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object.
第一数据获得模块21具体用于用带有摄像头的移动设备采集位于物体上的标识或防伪标签的图像,并进行光学识别,以获得第一数据。The first data obtaining module 21 is specifically configured to collect an image of the identification or anti-counterfeit label located on the object by using the mobile device with the camera, and perform optical recognition to obtain the first data.
标识或防伪标签包括但不限于文字、或字符或文字和字符的组合,或二维码或条形码。Identification or security labels include, but are not limited to, text, or characters, or a combination of text and characters, or a two-dimensional code or barcode.
第一数据获得模块21包括:第三采集单元和第一数据获得单元。The first data obtaining module 21 includes: a third collecting unit and a first data obtaining unit.
第三采集单元用于用带有摄像头的移动设备采集物体上的防伪标签的图像,其中,防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。The third collecting unit is configured to collect an image of the anti-counterfeit label on the object by using a mobile device with a camera, wherein the anti-counterfeiting label comprises a base layer and a drip layer, and the drip layer is dispersed and solidified by a colloid containing a plurality of particles to the base layer. Formed, at least the number and location of the particles in the drip layer are random.
第一数据获得单元用于光学识别滴膜层中的粒子的数量以及位置,并将识别出来的滴膜层中的粒子的数量以及位置按顺序组合成第一数据。The first data obtaining unit is configured to optically identify the number and position of the particles in the drip layer, and sequentially combine the number and position of the particles in the identified drip layer into the first data.
第一数据获得单元具体用于光学识别滴膜层中的粒子的数量、位置以及颜色,并将识别出来的滴膜层中的粒子的数量、位置以及颜色按顺序组合成第一数据,其中,滴膜层中的所有粒子颜色至少为一种,如果颜色为两种或两种以上,则颜色的分布也是随机的。The first data obtaining unit is specifically configured to optically identify the number, position, and color of the particles in the drip layer, and sequentially combine the number, position, and color of the particles in the identified drip layer into the first data, where The color of all particles in the drip layer is at least one, and if the color is two or more, the distribution of colors is also random.
第一数据获得模块21还包括第一采集单元,第一采集单元用于用带有摄像头的移动设备对物体上的防伪标签的图像进行扫描;在采集防伪标签的图像之前,根据目标扫描区域边界特征锁定目标扫描区域;对锁定的目标扫描区域采集防伪标签的图像。The first data obtaining module 21 further includes a first collecting unit, configured to scan an image of the security label on the object with the mobile device with the camera; before the image of the security label is collected, according to the boundary of the target scanning area The feature locks the target scan area; the captured image of the security label is captured for the locked target scan area.
第二数据获得模块22用于在获取第一数据后移动设备本机产生第二数据,第二数据包括与移动设备本机关联的唯一性数据。The second data obtaining module 22 is configured to generate second data by the mobile device after acquiring the first data, where the second data includes unique data associated with the local device of the mobile device.
第二数据可以是移动设备的号码中预定位数的号码,或者是国际移动用户识别码IMSI中预定位数的代码,或者是国际移动设备识别码IMEI中预定位数的代码中的一种。或者,第二数据还可以是移动设备本机扫描的时间数据,或者是移动设备本机扫描的地点数据,或者是移动设备本机扫描的时间数据和地点数据两者的组合。The second data may be a number of predetermined digits in the number of the mobile device, or a code of a predetermined number of bits in the International Mobile Subscriber Identity (IMSI), or one of the codes of the predetermined number of bits in the International Mobile Equipment Identity IMEI. Alternatively, the second data may also be time data scanned by the mobile device locally, or location data scanned by the mobile device locally, or a combination of time data and location data scanned by the mobile device.
发送模块23用于向鉴别服务器发送验证数据,验证数据是包括第一数据和第二数据在内的组合数据,或是第一数据和第二数据的映射数据,以第一数据在鉴别服务器中查找匹配验证数据的正确结果,进而得到鉴别结果,若能够查找得到匹配的正确结果,则鉴别结果是判断为防伪标签为真实标签,否则判断为虚假标签,其中,正确结果是第一数据作为正确结果被记录于数据库中以待验证时查证真伪。The sending module 23 is configured to send the verification data to the authentication server, where the verification data is combined data including the first data and the second data, or mapping data of the first data and the second data, where the first data is in the authentication server. Find the correct result of matching the verification data, and then obtain the identification result. If the correct result can be found, the authentication result is judged as the real label, otherwise it is judged as a false label, wherein the correct result is the first data as correct The results are recorded in the database to verify the authenticity when verification is required.
接收模块24用于接收来自鉴别服务器的鉴别结果。The receiving module 24 is configured to receive the authentication result from the authentication server.
本发明实施方式移动设备获取对防伪信息进行识别而得到的第一数据,所述第一数据用以唯一标识相应物体;在获取所述第一数据后所述移动设备本机产生第二数据;所述移动设备向鉴别服务器发送验证数据;所述移动设备接收来自所述鉴别服务器的鉴别结果。由于第一数据和第二数据是代表唯一性的数据,特别是第一数据用以唯一标识相应物体,通过这种方式,确保防伪信息的唯一性,仿造者无法复制,提高了防伪的可靠性。In the embodiment of the present invention, the mobile device obtains the first data obtained by identifying the anti-counterfeiting information, where the first data is used to uniquely identify the corresponding object; after acquiring the first data, the mobile device locally generates the second data; The mobile device transmits authentication data to an authentication server; the mobile device receives an authentication result from the authentication server. Since the first data and the second data are data representing uniqueness, in particular, the first data is used to uniquely identify the corresponding object. In this way, the uniqueness of the anti-counterfeiting information is ensured, and the counterfeiter cannot copy, thereby improving the reliability of the anti-counterfeiting. .
参阅图13,图13是本发明移动设备又一实施方式的结构示意图,移动设备包括:锁定模块31、光学识别模块32。Referring to FIG. 13, FIG. 13 is a schematic structural diagram of still another embodiment of a mobile device according to the present invention. The mobile device includes: a locking module 31 and an optical recognition module 32.
需要说明的是,本实施方式的移动设备可以执行图2和图3所示方法流程中所有的步骤。It should be noted that the mobile device of the present embodiment can perform all the steps in the method flow shown in FIG. 2 and FIG.
锁定模块31用于在进行光学识别前,根据目标扫描区域边界特征锁定目标扫描区域。The locking module 31 is configured to lock the target scanning area according to the target scanning area boundary feature before performing optical recognition.
目标扫描区域是指为进行有效的光学识别而必不可少的扫描区域,小于目标扫描区域则获得不完整的光学识别信息,大于等于目标扫描区域均可以获得完整的光学识别信息。The target scanning area refers to a scanning area that is indispensable for effective optical recognition. If the target scanning area is smaller than the target scanning area, incomplete optical identification information is obtained, and the optical identification information can be obtained by the target scanning area.
在进行光学识别时,扫描区域是比较大的区域,在该区域并不是所有的信息是必要的,有些区域还是空白区域,为了提高扫描速度和效率,在目标扫描区域的周围设置边界特征,有助于快速锁定目标扫描区域,只对目标扫描区域进行光学识别,既可以获得完整的光学识别信息,又可以提高扫描速度和效率。When performing optical recognition, the scanning area is a relatively large area in which not all information is necessary, and some areas are still blank areas. In order to improve scanning speed and efficiency, boundary features are set around the target scanning area. Helps quickly lock the target scanning area and optically recognize only the target scanning area, which can obtain complete optical identification information and improve scanning speed and efficiency.
目标扫描区域边界特征是指可以锁定目标扫描区域的边界特征,例如,在目标扫描区域的边界使用指定的颜色、指定的图形等,或者将目标扫描区域和非目标扫描区域分别采用不同的色彩,使得目标扫描区域和非目标扫描区域形成明显的边界特征。The target scanning area boundary feature refers to a boundary feature that can lock the target scanning area, for example, using a specified color, a specified graphic, or the like at a boundary of the target scanning area, or using a different color for the target scanning area and the non-target scanning area, respectively. The target scan area and the non-target scan area are made to form a distinct boundary feature.
具体来说,边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。例如,目标扫描区域外(即非目标扫描区域)使用黑色的颜色,目标扫描区域使用白色的颜色,据此两种颜色之间的差异即可很快获得边界特征。Specifically, the boundary feature is obtained by identifying the difference between the color of the target scanning area itself and the color outside the target scanning area. For example, the out-of-target scan area (ie, the non-target scan area) uses a black color, and the target scan area uses a white color, and the boundary feature can be quickly obtained based on the difference between the two colors.
另外,边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。例如:在目标扫描区域的两边设置边界特征:两个矩形,两个矩形的宽度和两个矩形之间的距离所围成的区域即为目标扫描区域;或在目标扫描区域的边界设置指定的色彩,如红色,红色所围成的区域即为目标扫描区域。In addition, the boundary features are obtained from identifying graphics or colors that define the boundaries of the target scan area. For example, the boundary features are set on both sides of the target scanning area: two rectangles, the width of the two rectangles and the distance between the two rectangles are the target scanning area; or the specified boundary is set at the boundary of the target scanning area. The area enclosed by colors such as red and red is the target scanning area.
比如,如果在锁定目标扫描区域的过程中,如果移动设备的屏幕上目标扫描区域周围显示不闪烁的绿框,则表示目标扫描区域锁定成功;如果正在锁定目标扫描区域,则可以显示闪烁的绿框;如果锁定目标扫描区域失败,则显示红框或不显示颜色框。For example, if a green frame that does not blink is displayed around the target scanning area on the screen of the mobile device during the locking of the target scanning area, the target scanning area is successfully locked; if the target scanning area is being locked, the flashing green may be displayed. Box; if the target scan area fails to lock, a red box is displayed or the color box is not displayed.
光学识别模块32用于对锁定的目标扫描区域进行光学识别。The optical identification module 32 is for optically identifying the locked target scanning area.
本发明实施方式通过目标扫描区域的边界特征,可以快速锁定目标扫描区域,从而可以提高扫描识别的速度,减少移动设备在进行识别时的负载。The embodiment of the present invention can quickly lock the target scanning area by the boundary feature of the target scanning area, thereby improving the speed of scanning recognition and reducing the load of the mobile device when performing identification.
该移动设备还包括判断模块,判断模块用于根据目标扫描区域边界特征判断进行扫描的角度是否满足要求,在满足要求时返回锁定模块31。The mobile device further includes a judging module, wherein the judging module is configured to judge whether the angle of the scanning meets the requirement according to the boundary feature of the target scanning area, and return to the locking module 31 when the requirement is met.
另外,判断模块具体用于在当前扫描角度下,判断目标扫描区域边界特征是否能够通过纠错算法进行纠正,在能够通过纠错算法进行纠正时,确定当前扫描角度满足要求。In addition, the determining module is specifically configured to determine whether the boundary feature of the target scanning area can be corrected by the error correction algorithm under the current scanning angle, and when the correction can be performed by the error correction algorithm, determine that the current scanning angle satisfies the requirement.
在扫描光线没有垂直扫描区域平面,或者扫描区域在一个弯曲的球面上等情况时,目标扫描区域边界特征通常会发生形变,在不做处理的情况下,扫描设备可能无法锁定目标扫描区域边界特征。因此,在一定的扫描角度范围内,可以通过纠错算法进行纠正,使得扫描设备依然可以锁定目标扫描区域边界特征。在可以通过纠错算法进行纠正时,当前扫描角度是满足要求的。When the scanning light does not have a vertical scanning area plane, or the scanning area is on a curved spherical surface, the boundary characteristics of the target scanning area are usually deformed, and the scanning device may not be able to lock the boundary feature of the target scanning area without processing. . Therefore, within a certain range of scanning angles, correction can be performed by an error correction algorithm, so that the scanning device can still lock the boundary features of the target scanning area. When the correction can be made by the error correction algorithm, the current scanning angle is satisfactory.
此时,光学识别模块32具体用于在当前扫描角度满足要求时,对锁定的所述目标扫描区域进行光学识别和纠正。At this time, the optical identification module 32 is specifically configured to optically recognize and correct the locked target scanning area when the current scanning angle satisfies the requirement.
在当前扫描角度满足要求时,对锁定的目标扫描区域一边进行光学识别,一边利用纠错算法就行纠正,以获得纠正后的识别信息。When the current scanning angle satisfies the requirement, the locked target scanning area is optically recognized while being corrected by the error correction algorithm to obtain the corrected identification information.
需要说明的是,如果在通过目标扫描区域边界特征锁定目标扫描区域时没有纠正目标扫描区域边界特征,即扫描设备自动通过目标扫描区域边界特征锁定目标扫描区域,这时在对目标扫描区域进行光学识别时,也可以根据实际情况对光学识别的结果进行纠正。It should be noted that if the target scanning area boundary feature is not corrected when the target scanning area is locked by the target scanning area boundary feature, that is, the scanning device automatically locks the target scanning area by the target scanning area boundary feature, then the target scanning area is optically When identifying, the result of optical recognition can also be corrected according to the actual situation.
其中,进行扫描的角度满足的要求是:角度大于等于第一阈值且小于等于第二阈值,角度是进行扫描的光线与目标扫描区域平面的夹角。The requirement that the angle of the scanning is satisfied is that the angle is greater than or equal to the first threshold and less than or equal to the second threshold, and the angle is an angle between the scanned light and the plane of the target scanning area.
另外,第一阈值是75度,第二阈值是105度。In addition, the first threshold is 75 degrees and the second threshold is 105 degrees.
例如:如果定义的边界特征为矩形,倾斜扫描时,在移动设备上感知到的矩形发生变形,而这变形与倾斜角度成预定关系,利用这个预定关系和得到的变形度,即可获知倾斜角度。For example, if the defined boundary feature is a rectangle, when the oblique scan is performed, the rectangle sensed on the mobile device is deformed, and the deformation is in a predetermined relationship with the tilt angle, and the tilt angle is obtained by using the predetermined relationship and the obtained degree of deformation. .
如果进行扫描的角度过于倾斜,目标扫描区域的边界特征不容易识别,或识别错误,导致不能正确锁定目标扫描区域。If the angle of the scan is too oblique, the boundary features of the target scan area are not easily recognized, or an error is recognized, resulting in that the target scan area cannot be correctly locked.
移动设备还包括纠错与还原模块,纠错与还原模块用于在锁定的目标扫描区域发生变形且变形在预定范围内时,利用纠错算法对光学识别后的目标扫描区域进行纠错与还原。The mobile device further includes an error correction and restoration module, and the error correction and restoration module is configured to perform error correction and restoration on the optically recognized target scanning area by using an error correction algorithm when the locked target scanning area is deformed and deformed within a predetermined range. .
例如,目标扫描区域是长方形的防伪标签,防伪标签贴在球面或弧形的杯子上,此时,目标扫描区域由于贴在球面或弧形的杯子上而发生变形,变成环形或弧形等,如果该变形在预定范围内,可以利用纠错算法对光学识别后的目标扫描区域进行纠错与还原。For example, the target scanning area is a rectangular anti-counterfeit label, and the anti-counterfeiting label is attached to a spherical or curved cup. At this time, the target scanning area is deformed by being attached to a spherical or curved cup, and becomes a ring or an arc. If the deformation is within a predetermined range, the error correction algorithm may be used to correct and restore the optically recognized target scanning area.
目标扫描区域是防伪标签。防伪标签包括基层以及滴膜层,滴膜层是由包含多个粒子的胶体分散到基层后干燥固化形成的,滴膜层中的粒子至少其数量以及位置是随机的。The target scan area is an anti-counterfeit label. The anti-counterfeit label comprises a base layer and a drip layer, which is formed by dispersing a colloid comprising a plurality of particles into the base layer and drying and solidifying, and at least the number and position of the particles in the drip layer are random.
本发明实施方式在进行光学识别前,根据目标扫描区域边界特征锁定目标扫描区域;对锁定的目标扫描区域进行光学识别。由于在目标扫描区域设置了边界特征,通过这种方式,可以快速锁定目标扫描区域,可以快速扫描和识别,减少了扫描设备的负荷。In the embodiment of the present invention, before the optical recognition, the target scanning area is locked according to the boundary feature of the target scanning area; and the locked target scanning area is optically recognized. Since the boundary feature is set in the target scanning area, the target scanning area can be quickly locked in this way, and the scanning and identification can be quickly performed, thereby reducing the load on the scanning device.
以上所述仅为本发明的实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above is only the embodiment of the present invention, and is not intended to limit the scope of the invention, and the equivalent structure or equivalent process transformation of the present invention and the contents of the drawings may be directly or indirectly applied to other related technologies. The fields are all included in the scope of patent protection of the present invention.

Claims (20)

  1. 一种光学识别方法,其特征在于,所述方法包括:An optical recognition method, characterized in that the method comprises:
    在进行光学识别前,根据目标扫描区域边界特征锁定所述目标扫描区域;Locking the target scanning area according to a target scanning area boundary feature before performing optical recognition;
    对锁定的所述目标扫描区域进行光学识别。The locked target scanning area is optically identified.
  2. 根据权利要求1的方法,其特征在于,所述边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。The method of claim 1 wherein said boundary feature is obtained from identifying a difference between a color of the target scan area itself and a color outside the target scan area.
  3. 根据权利要求1的方法,其特征在于,所述边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。 The method of claim 1 wherein said boundary features are obtained from identifying graphics or colors that define boundaries of the target scan area.
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述根据目标扫描区域边界特征锁定所述目标扫描区域的步骤之前包括:根据所述目标扫描区域边界特征判断进行扫描的角度是否满足要求,若满足要求则执行所述根据目标扫描区域边界特征锁定所述目标扫描区域的步骤,否则不执行所述根据目标扫描区域边界特征锁定所述目标扫描区域的步骤。The method according to any one of claims 1 to 3, wherein the step of locking the target scanning area according to a target scanning area boundary feature comprises: determining an angle of scanning according to the target scanning area boundary feature Whether the requirement is met, and if the requirement is met, the step of locking the target scanning area according to the target scanning area boundary feature is performed, otherwise the step of locking the target scanning area according to the target scanning area boundary feature is not performed.
  5. 根据权利要求4所述的方法,其特征在于,所述根据所述目标扫描区域边界特征判断进行扫描的角度是否满足要求的步骤包括:The method according to claim 4, wherein the step of determining, according to the boundary feature of the target scanning area, whether the angle of scanning meets the requirements comprises:
    在当前扫描角度下,判断所述目标扫描区域边界特征是否能够通过纠错算法进行纠正;Determining, at a current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm;
    若能够通过纠错算法进行纠正,则当前扫描角度满足要求。If correction can be made by an error correction algorithm, the current scan angle meets the requirements.
  6. 根据权利要求5所述的方法,其特征在于,所述对锁定的所述目标扫描区域进行光学识别的步骤包括:若当前扫描角度满足要求,则对锁定的所述目标扫描区域进行光学识别和纠正。The method according to claim 5, wherein the step of optically recognizing the locked target scanning area comprises optically recognizing the locked target scanning area if the current scanning angle satisfies the requirement correct.
  7. 根据权利要求4所述的方法,其特征在于,所述进行扫描的角度满足的要求是:所述角度大于等于第一阈值且小于等于第二阈值,其中,所述角度是进行扫描的光线与所述目标扫描区域平面的夹角。The method according to claim 4, wherein the angle at which the scanning is performed is satisfied: the angle is greater than or equal to a first threshold and less than or equal to a second threshold, wherein the angle is a light that is scanned and An angle between the plane of the target scanning area.
  8. 根据权利要求1至3任一项所述的方法,其特征在于,所述对锁定的所述目标扫描区域进行光学识别的步骤之后,包括:The method according to any one of claims 1 to 3, wherein after the step of optically recognizing the locked target scanning area, the method comprises:
    若锁定的所述目标扫描区域发生变形且所述变形在预定范围内,则利用纠错算法对光学识别后的所述目标扫描区域进行纠错与还原。If the locked target scanning area is deformed and the deformation is within a predetermined range, the optically recognized target scanning area is error-corrected and restored by using an error correction algorithm.
  9. 根据权利要求1所述的方法,其特征在于,所述目标扫描区域是防伪标签。The method of claim 1 wherein said target scanning area is an anti-counterfeit label.
  10. 根据权利要求9所述的方法,其特征在于,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。The method according to claim 9, wherein the anti-counterfeit label comprises a base layer and a drip film layer, and the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer and drying and solidifying, At least the number and location of the particles in the drip layer are random.
  11. 一种移动设备,其特征在于,所述移动设备包括:A mobile device, characterized in that the mobile device comprises:
    锁定模块,用于在进行光学识别前,根据目标扫描区域边界特征锁定所述目标扫描区域;a locking module, configured to lock the target scanning area according to a target scanning area boundary feature before performing optical recognition;
    光学识别模块,用于对锁定的所述目标扫描区域进行光学识别。An optical identification module for optically identifying the locked target scanning area.
  12. 根据权利要求11所述的移动设备,其特征在于,所述边界特征是从识别目标扫描区域自身色彩与目标扫描区域外色彩之间的差异而获得。The mobile device of claim 11, wherein the boundary feature is obtained from a difference between a color of the target scanning area and a color outside the target scanning area.
  13. 根据权利要求11所述的移动设备,其特征在于,所述边界特征是从识别定义目标扫描区域边界的图形或色彩而获得。The mobile device of claim 11 wherein said boundary features are obtained from identifying graphics or colors that define boundaries of the target scan area.
  14. 根据权利要求11至13任一项所述的移动设备,其特征在于,所述移动设备还包括判断模块,所述判断模块用于根据所述目标扫描区域边界特征判断进行扫描的角度是否满足要求,在满足要求时返回所述锁定模块。The mobile device according to any one of claims 11 to 13, wherein the mobile device further comprises a determining module, wherein the determining module is configured to determine, according to the boundary feature of the target scanning area, whether an angle of scanning meets a requirement Return to the locking module when the requirements are met.
  15. 根据权利要求14所述的移动设备,其特征在于,所述判断模块具体用于在当前扫描角度下,判断所述目标扫描区域边界特征是否能够通过纠错算法进行纠正,在能够通过纠错算法进行纠正时,确定当前扫描角度满足要求。The mobile device according to claim 14, wherein the determining module is configured to determine, according to a current scanning angle, whether the boundary feature of the target scanning area can be corrected by an error correction algorithm, and can pass an error correction algorithm. When making corrections, make sure the current scan angle meets the requirements.
  16. 根据权利要求15所述的移动设备,其特征在于,所述光学识别模块具体用于在当前扫描角度满足要求时,对锁定的所述目标扫描区域进行光学识别和纠正。The mobile device according to claim 15, wherein the optical identification module is specifically configured to optically identify and correct the locked target scanning area when the current scanning angle satisfies the requirement.
  17. 根据权利要求14所述的移动设备,其特征在于,所述进行扫描的角度满足的要求是:所述角度大于等于第一阈值且小于等于第二阈值,其中,所述角度是进行扫描的光线与所述目标扫描区域平面的夹角。The mobile device according to claim 14, wherein the angle at which the scanning is performed is satisfied: the angle is greater than or equal to a first threshold and less than or equal to a second threshold, wherein the angle is a light that is scanned. The angle with the plane of the target scanning area.
  18. 根据权利要求11至13任一项所述的移动设备,其特征在于,所述移动设备还包括纠错与还原模块,所述纠错与还原模块用于在锁定的所述目标扫描区域发生变形且所述变形在预定范围内时,利用纠错算法对光学识别后的所述目标扫描区域进行纠错与还原。The mobile device according to any one of claims 11 to 13, wherein the mobile device further comprises an error correction and restoration module, wherein the error correction and restoration module is adapted to be deformed in the locked target scanning area And when the deformation is within a predetermined range, the optically recognized target scanning area is error-corrected and restored by using an error correction algorithm.
  19. 根据权利要求11所述的移动设备,其特征在于,所述目标扫描区域是防伪标签。The mobile device of claim 11 wherein said target scanning area is a security label.
  20. 根据权利要求19所述的移动设备,其特征在于,所述防伪标签包括基层以及滴膜层,所述滴膜层是由包含多个粒子的胶体分散到所述基层后干燥固化形成的,所述滴膜层中的粒子至少其数量以及位置是随机的。The mobile device according to claim 19, wherein the anti-counterfeit label comprises a base layer and a drip film layer, wherein the drip film layer is formed by dispersing a colloid comprising a plurality of particles to the base layer, and drying and solidifying. At least the number and location of the particles in the drip layer are random.
PCT/CN2013/086962 2013-09-16 2013-11-12 Optical recognition method and mobile device WO2015035705A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310423173.X 2013-09-16
CN201310423173.XA CN104463292B (en) 2013-09-16 2013-09-16 Optical identification method and mobile device

Publications (1)

Publication Number Publication Date
WO2015035705A1 true WO2015035705A1 (en) 2015-03-19

Family

ID=52664991

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/086962 WO2015035705A1 (en) 2013-09-16 2013-11-12 Optical recognition method and mobile device

Country Status (2)

Country Link
CN (1) CN104463292B (en)
WO (1) WO2015035705A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108375578A (en) * 2018-01-23 2018-08-07 杭州俱健基因生物科技有限公司 A method of selecting scanning area in multiple single regions based on pathological section scanning means
CN109543804A (en) * 2018-11-28 2019-03-29 程昔恩 A kind of method of Ceramic anti-fake and verifying
CN112329673A (en) * 2020-11-12 2021-02-05 北京文通科技有限公司 Anti-counterfeiting fiber identification method, anti-counterfeiting identification device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040112962A1 (en) * 2000-12-20 2004-06-17 Farrall Andrew John Security, identificaiton and verification systems
CN101207681A (en) * 2006-12-20 2008-06-25 佳能株式会社 Image processing apparatus capable of identifying large dot region and small dot region
CN101583978A (en) * 2007-05-15 2009-11-18 Lgn-Sys株式会社 Apparatus for media recognition and method for media kind distinction with the same
US20090325640A1 (en) * 2008-04-09 2009-12-31 Ven Chava System and Method for Multimedia Storing and Retrieval Using Low-Cost Tags as Virtual Storage Mediums

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070140564A1 (en) * 2004-03-04 2007-06-21 Sharp Kabushiki Kaisha 2-Dimensional code region extraction method, 2-dimensional code region extraction device, electronic device, 2-dimensional code region extraction program, and recording medium containing the program
CN100377167C (en) * 2006-03-17 2008-03-26 北京紫光捷通科技有限公司 Two-dimensional code area precisive positioning method for two-dimensional recognition
CN101916387B (en) * 2010-08-11 2012-09-26 河北工业大学 Three-dimensional barcode label and manufacturing method thereof
CN102542303A (en) * 2010-12-24 2012-07-04 富士通株式会社 Device and method for generating classifier of specified object in detection image

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040112962A1 (en) * 2000-12-20 2004-06-17 Farrall Andrew John Security, identificaiton and verification systems
CN101207681A (en) * 2006-12-20 2008-06-25 佳能株式会社 Image processing apparatus capable of identifying large dot region and small dot region
CN101583978A (en) * 2007-05-15 2009-11-18 Lgn-Sys株式会社 Apparatus for media recognition and method for media kind distinction with the same
US20090325640A1 (en) * 2008-04-09 2009-12-31 Ven Chava System and Method for Multimedia Storing and Retrieval Using Low-Cost Tags as Virtual Storage Mediums

Also Published As

Publication number Publication date
CN104463292A (en) 2015-03-25
CN104463292B (en) 2018-01-09

Similar Documents

Publication Publication Date Title
WO2015035702A1 (en) Anti-counterfeiting method and mobile device
WO2015035701A1 (en) Anti-counterfeiting label, anti-counterfeiting label manufacturing method, and anti-counterfeiting method
WO2020226316A1 (en) Transfer apparatus and method of manufacturing micro led display using the same
WO2016060397A1 (en) Method and apparatus for processing screen using device
WO2018074870A1 (en) Augmented reality object providing method and server using image authentication
WO2015133699A1 (en) Object recognition apparatus, and recording medium in which method and computer program therefor are recorded
WO2019182307A1 (en) Camera module and optical device comprising same
WO2015035705A1 (en) Optical recognition method and mobile device
WO2014058086A1 (en) Image processing device and image processing method
WO2018166091A1 (en) Method, system, and terminal for face-to-face loan signing, and computer-readable storage medium
WO2020117006A1 (en) Ai-based face recognition system
WO2017096603A1 (en) Method and system for data connection, transmission, reception and interaction, storage device, and aircraft
WO2022050507A1 (en) Method and system for monitoring photovoltaic power generation module
WO2019146812A1 (en) Vehicle update system and control method
WO2020116680A1 (en) System and method for detecting and recognizing vehicle license plate
WO2021177695A1 (en) Electronic device for providing transaction information and operating method thereof
WO2019164281A1 (en) Electronic device and control method thereof
WO2023033364A1 (en) Display device and electronic apparatus including same
WO2021158058A1 (en) Method for providing filter and electronic device supporting the same
WO2016099165A1 (en) Image sensor, image acquiring device comprising same, and portable terminal comprising the device
WO2015035704A1 (en) Optical recognition method and mobile device
WO2020145744A1 (en) Camera device and electronic device including same
WO2020101420A1 (en) Method and apparatus for measuring optical characteristics of augmented reality device
WO2017026651A1 (en) Electronic commerce method
WO2015035703A1 (en) Anti-counterfeiting method and mobile device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13893588

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13893588

Country of ref document: EP

Kind code of ref document: A1