Image anti-counterfeiting method and device, terminal and computer readable medium

A computer program and image technology, applied in the field of computer-readable media, can solve problems such as identification and misappropriation of bad merchants, loss of authentic merchants, etc., to achieve the effects of enriching product information content, ensuring authenticity, and increasing the difficulty of counterfeiting

Pending Publication Date: 2021-04-30
GREE ELECTRIC APPLIANCES INC +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently commonly used images are single-layer images, which are easily identified and embezzled by unscrupulous merchants. Once the images of authentic merchants are stolen, it will be a great loss for aut

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image anti-counterfeiting method and device, terminal and computer readable medium
  • Image anti-counterfeiting method and device, terminal and computer readable medium
  • Image anti-counterfeiting method and device, terminal and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In Example 1, including the above figure 1 All the steps of the method shown, wherein step 101 is realized by the following processing methods:

[0046] The scanning result is received, wherein the superimposed image corresponding to the scanning result is an underlying image in the composite anti-counterfeiting layer or a composite image containing the underlying image. The composite anti-counterfeiting layer in this application document is a single-layer or multi-layer image, wherein, when the composite anti-counterfeiting layer is a single layer, the superimposed image is the bottom layer image, which is a single-layer image; when the composite anti-counterfeiting layer is multi-layer , the superimposed image is a composite image containing the bottom image, and the composite image is at least two layers of images containing the bottom image, wherein, for the composite anti-counterfeiting layer of N layers, there is one bottom image and (N-1) composite images. For e...

Embodiment 2

[0048] In Example 2, including the above figure 1 All the steps of the method shown, wherein, for step 102: judging according to the scanning result whether each layer of superimposed images of the composite anti-counterfeiting layer has never been scanned, through the following processing methods, such as figure 2 Shown:

[0049] Step 201: judging whether the superimposed image has been scanned;

[0050] Step 202: In the case that the superimposed image has never been scanned, verify whether other superimposed images in the composite anti-counterfeiting layer to which the superimposed image belongs have never been scanned.

[0051]According to the scanning result of the superimposed image, it is judged whether the superimposed image has been scanned by other users before this scan. Whether other superimposed images of the composite anti-counterfeiting layer have been scanned or not, wherein the determination of whether other superimposed images of the composite anti-counte...

Embodiment 3

[0056] In Example 3, including the above figure 1 All the steps of the method shown, wherein, in the case where the composite anti-counterfeiting layer has at least two layers, the identification information is sent to the first user and / or the second user respectively, so that the first user The user and / or the second user determine that the image is valid under the condition that at least two of the identification information are consistent, through the following processing methods:

[0057] In the case where the composite anti-counterfeiting layer has at least two layers, the identification information is sent to the first user and / or the second user respectively according to the number of scanning layers of the user, wherein the identification information corresponding to the different superimposed images of each layer is consistent, if If the user determines that at least two received identification information are consistent, the product with the superimposed image is de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image anti-counterfeiting method and device, a terminal and a computer readable medium, and the method comprises the steps: receiving a scanning result, and enabling a superposed image corresponding to the scanning result to be a bottom-layer image in a composite anti-counterfeiting image layer or a duplex image containing the bottom-layer image; judging whether each layer of superimposed image of the composite anti-counterfeiting layer is not scanned or not according to the scanning result; if so, sending identification information for judging that the image is valid to a first user, wherein the first user feeds back a scanning result for the first time for the superimposed image, and the probability of product counterfeiting can be reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner GREE ELECTRIC APPLIANCES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products