Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, completeSite preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based onEmbodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not madeEmbodiment, belong to the scope of protection of the invention.
One embodiment of the invention provides a kind of false-proof detection method, and this method is used for the false proof inspection of object to be detectedSurvey, and object to be detected includes:First memory block and the second memory block.Wherein, the first memory block is read-only memory block, for depositingThe first identification code is stored up, the second memory block is erasable memory block, and for storing the second identification code, and the first identification code can be uniqueIdentify object to be detected.
What deserves to be explained is the first memory block, can be a read-only magnetic or other readable Jie in the present embodimentThe storage region of matter, the first identification code can be the identification information such as character, pattern, matrix, if its can unique mark it is to be checkedSurvey object.Second memory block can be an erasable magnetic or the storage region of other erasable mediums, and second knowsOther code can be a string of character strings, random pattern, random digit etc..Anti-counterfeiting detector, can include the integrated above-mentioned step of executionThe software of rapid function and can connection server terminal, and data that terminal can be connected to by wireless modes such as bluetoothsRead-write equipment, and data exchange is carried out by the database in terminal and server;Anti-counterfeiting detector, which is alternatively, to be possessed in executionState the single equipment of step perform function.Object to be detected includes bank note, marketable securities, check etc..
As shown in figure 1, this method includes:
101st, Anti-counterfeiting detector obtains the first identification code and the second identification code, and by first identification code and the second identification codeIt is sent to server and code matching is identified.
102nd, server judges to be detected right according to the matching result of the first identification code and the second identification code in the serverThe legitimacy of elephant.
What deserves to be explained is in the present embodiment, because the second identification code is erasable, the first identification code and second is knownOther code, together constitute unique dynamic marks of object to be detected.
The embodiments of the invention provide a kind of false-proof detection method, for the anti-counterfeiting detection of object to be detected, and it is to be detectedObject includes:Read-only memory block and erasable memory block, it is respectively used to store the first identification code and the second identification code, anti-counterfeiting detectionDevice will get the first identification code and the second identification code is sent to server and code matching is identified;And then server according to this twoThe matching result of class identification code judges the legitimacy of object to be detected.When in the prior art, using high-precision scanner, printerCan massive duplication go out for counterfeit, in the present embodiment, be with the addition of when carrying out anti-counterfeiting detection to erasable region contentMatching so that the duplication of object to be detected is nonsensical, so as to significantly improve the reliability of anti-counterfeiting detection.
With reference to the above-mentioned method flow that embodiment describes as shown in Figure 1, in a kind of implementation of the present embodiment, also retouchThe more new technological process of the second identification code has been stated, as Figure 1-1, when the first identification code and the matching of the second identification code, the more new streamJourney includes following execution steps:
01st, the second new identification code of server generation, and the second new identification code is sent to Anti-counterfeiting detector.
Wherein, when server generates the second new identification code, can be randomly generated;Or server is according to default lifeGenerated into algorithm, in the present embodiment, server can be with the second new identification code of dynamic generation, and the second new identification code is with beforeThe the second identification code difference stated, for the specific generating mode of the second new identification code, and the form of the composition, in this realityApply in example and be not construed as limiting.
02nd, Anti-counterfeiting detector is after the second new identification code is received, by the second identification code in the second memory blockIt is updated to the second new identification code.
What deserves to be explained is with reference to the description of above-mentioned method flow as shown in Figure 1, illustrate in the false proof of object to be detectedIn detection process, the content stored by read-only region and erasable area is detected, namely is realized and prevented using dynamic codePuppet detection, and this implementation describes the reality more new technological process of dynamic code.And in the present embodiment, the second identification code is updated toAfter the second new identification code, the second identification code originally will no longer be available, and thus effectively prevent and treats detection objectReplicate.
In another middle implementation of the embodiment of the present invention, specifically describe the first identification code and the second identification code is takingThe flow of code matching is identified in business device, as shown in Figure 1-2, this matching flow includes:
03rd, server is matched the first identification code with the identification code of storage first in server.
04th, when the match is successful for the first identification code, server knows the storage second in the second identification code and serverOther code is matched.
What deserves to be explained is server includes having stored the first identification code and has stored the second identification code, and storeThe quantity of identification code is larger, identification codes of these storages can be with the unique corresponding identification code of former type identification code, can alsoIt is and former identification code identical identification code.Specific matching flow, searched as in identification code has been stored with to be detected rightAs the identical or corresponding identification code of the identification code of upper acquisition, when finding, it is determined that the match is successful, when not finding,It is determined that matching is unsuccessful.
And the description in above-mentioned steps 102 is combined, the legitimacy for judging object to be detected according to matching result is specially:WhenWhen it fails to match in the server, server judges that object to be detected is illegal for first identification code or the second identification code;When firstWhen the match is successful in the server, server judges that object to be detected is legal for identification code and the second identification code.
In practical implementation, server is in yard matching process is identified, and when the match is successful, the server is alsoThe match is successful message can be sent to Anti-counterfeiting detector, and then Anti-counterfeiting detector can inform that user's object to be detected is legal,When Anti-counterfeiting detector informs that user is legal, it can show that legal information either plays legal prompt tone or other informing modes,Accordingly, when matching unsuccessful, it can also inform that user's object to be detected does not conform to by Anti-counterfeiting detector by above-mentioned approachMethod.
Another embodiment of the present invention provides a kind of false-proof detection method, in the present embodiment the application scenarios of this methodInclude:Server, Anti-counterfeiting detector, and can carry out data transmission between server and Anti-counterfeiting detector.Wherein serverInclude database, sequence code 1, sequence code 2, sequence code 3 are stored with the database, and the server can generate sequence at randomRow code 3;Anti-counterfeiting detector can read the region content of sequence code 2, the region content of sequence code 3, and the region of erasable sequence code 3Content.Wherein, object to be detected includes the region of sequence code 1, the region of sequence code 2, the region of sequence code 3, and is deposited on respective regionsCorresponding sequence code is contained, such as, sequence code 1 is stored with sequence code 1 in region.The present embodiment using object to be detected as bank note,And exemplified by the region of sequence code 2 and the region of sequence code 3 are located in the anti-counterfeiting code (lower to be referred to as safety line) of bank note, illustrate, in order toThe apparent position that sequence code region in the bank note is depicted, distribution of the accompanying drawing to regional in this bank note will be passed throughSchematically described, as shown in Fig. 2 including in this bank note:The region 01 of sequence code 1, positioned at the lower left of bank note, safetyLine a, include in the safety line:The region 02 of sequence code 2, the region 03 of sequence code 3.
What deserves to be explained is sequence code 1, be a character string in the present embodiment, or for a Quick Response Code,The bar codes such as pdf417 codes, and the numbering of any same type bank note is all different.Sequence code 2, it is a read-only magneticOr the content of the storage region memory storage of other computer-readable recording mediums, actual storage content comprises at least the content of sequence code 1, in realityIn implementation process, the sequence code 2 can also include other safety check characters.Sequence code 2 is corresponding with the first above-mentioned identification code,The region of sequence code 2 is corresponding with the first above-mentioned memory block, and sequence code 3 is corresponding with the second above-mentioned identification code, the region of sequence code 3 withAbove-mentioned the second memory block is corresponding, and corresponding content describes identical, is not repeated.
In addition what deserves to be explained is, shown in above-mentioned Fig. 2 is a kind of distribution schematic diagram of each memory block on bank note,Its specific distributing position is not construed as limiting in embodiments of the present invention, any position that can be distributed on bank note.
With reference to the description of examples detailed above and respective application scene, as shown in figure 3, the execution flow of the example includes:
301st, Anti-counterfeiting detector reads sequence code 2 and sequence code 3.
In this example, Anti-counterfeiting detector reads sequence code 2 and sequence code 3, can be by the region of sequence code 2 and sequence3 regions of code are scanned acquisition.
302nd, the sequence code 2 read and sequence code 3 are sent to server by Anti-counterfeiting detector.
303rd, server is after sequence code 2 and sequence code 3 is received, the sequence that sequence code and server local have been storedRow code division is not matched.
What deserves to be explained is in the present embodiment, the sequence code got from bank note and the sequence of server local storageRow code, which carries out matching, to be included:There is one-to-one relationship in the sequence code got, or obtain with the sequence code storage being locally storedThe sequence code got is identical with the sequence code being locally stored, and matching process is to be searched whether in the multiple sequence codes being locally storedIt is present in the sequence code identical sequence code got, if found, illustrates sequence code that this gets with being locally storedSequence code the match is successful.
Specific matching flow includes:
A, server is matched the sequence code 2 obtained with the sequence code 2 being locally stored.
When the match is successful for sequence code 2 and the sequence code 2 being locally stored, following step b is continued executing with;When sequence code 2 withWhen the sequence code 2 being locally stored matches unsuccessful, it is counterfeit money to determine the bank note, to Anti-counterfeiting detector feedback counterfeit money instruction message.
B, server is matched the sequence code 3 obtained with the sequence code 3 being locally stored.
Matching flow in the step is similar with the matching flow described in above-mentioned example, when the sequence code 3 matches intoDuring work(, following step 04 is performed, when sequence code 3 matches unsuccessful, to Anti-counterfeiting detector feedback counterfeit money instruction message.
304th, server generates new sequence code 3, and the new sequence code 3 is fed back into Anti-counterfeiting detector.
305th, after Anti-counterfeiting detector receives new sequence code 3, replaced with the new sequence code 3 in the region of sequence code 3Former sequence code 3.
Another embodiment of the present invention provides a kind of anti-counterfeit detecting system, and the system is used for the false proof inspection of object to be detectedSurvey, object to be detected includes:First memory block and the second memory block.Wherein, the first memory block is read-only memory block, for storingFirst identification code, the second memory block is erasable memory block, for storing the second identification code, wherein, the first identification code is used for onlyOne mark object to be detected.
As shown in figure 4, this system includes Anti-counterfeiting detector 41, server 42, and Anti-counterfeiting detector 41 and server 42Carried out data transmission by bus 43.
Anti-counterfeiting detector 41, identified for obtaining the first identification code and the second identification code, and by the first identification code and secondCode is sent to server 42.
Server 42, for the first identification code and the second identification code being identified code matching;It is additionally operable to know according to firstOther code and the matching result of the second identification code judge the legitimacy of object to be detected.
In a kind of optional constituted mode of the system, server 42, it is additionally operable to when the first identification code and the second identification codeWhen the match is successful, the second new identification code is generated, and the second new identification code is sent to Anti-counterfeiting detector 41.
Anti-counterfeiting detector 41, it is additionally operable to after the second new identification code of the transmission of server 42 is received, second is knownOther code is updated to the second new identification code.
In another implementation of the present embodiment, server 42, it is additionally operable in the first identification code and server 42The identification code of storage first matched;When the match is successful for the first identification code, server 42 is by the second identification code and serviceThe identification code of storage second in device 42 is matched.It is additionally operable to, when it fails to match for the first identification code or the second identification code, sentenceFixed object to be detected is illegal;When the match is successful for the first identification code and the second identification code, judge that object to be detected is legal.
What deserves to be explained is the system shown in above-mentioned Fig. 4, available for the side realized shown in Fig. 1, Fig. 1-1, Fig. 1-2 and Fig. 3Method flow, for convenience of description, the part related to the embodiment of the present invention is illustrate only, particular technique details does not disclose, pleaseDescribed with reference to the related content of above-mentioned various embodiments of the present invention shown in the drawings.
The embodiments of the invention provide a kind of anti-counterfeit detecting system, for the anti-counterfeiting detection of object to be detected, and it is to be detectedObject includes:Read-only memory block and erasable memory block, it is respectively used to store the first identification code and the second identification code, anti-counterfeiting detectionDevice will get the first identification code and the second identification code is sent to server and code matching is identified;And then identified according to this two classThe matching result of code in the server judges the legitimacy of object to be detected.In the prior art, using high-precision scanner, printingDuring device can massive duplication go out for counterfeit, in the present embodiment, be with the addition of when carrying out anti-counterfeiting detection in erasable regionThe matching of appearance so that the duplication of object to be detected is nonsensical, so as to significantly improve the reliability of anti-counterfeiting detection.
In several embodiments provided herein, it should be understood that disclosed system and method, it can be passed throughIts mode is realized.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, anyThose familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be containedCover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.